Computer Forensics

Infinity Forensics delivers investigation for the electronic evidence fraud, identity theft, defamation, copyright, gambling, corporate fraud, anti-spamming, divorcee matrimony. Infinity Forensics is your need for litigation and investigation with minimal risk, cost and disruptions to your business.

Accidental/planned destruction of data, hardware failure or cyber attack can happen anytime and organization may be called upon respond, investigation and escalate the analysis to a formal investigation. Computer forensics is a branch of forensic science pertaining to legal evidence found in computer and digital storage mediums. It defines as preservation, identification, extraction, documentation and interpretation of computer media for evidentiary and/or root cause analysis.

Infinity Forensics consultants have in-depth knowledge and experience of grappling with all current and emerging threat areas. Clients also benefit from the way our services are closely integrated, with intelligence shared quickly between different service areas of our organization.

For example when an employee resigns, it is not always possible to know immediately whether the employee presents an unfair competitive threat. It may be a few weeks before an employer learns that the former employee engaged in misconduct.  Employee can easily involve in Intellectual Property Theft, Fraud, Computer or Internet Misuse, Bullying or Harassment, stealing or destroying valuable information

Our methodology includes:

Incident Identification and Assessment:

This involves investigation of the suspected systems to determine if a compromise has occurred. Careful attention is given to the preservation of evidence chains and where possible all examinations are performed

Recovery of evidence:

We use FTK Access Data imaging software to take a forensically sound image of any disks on affected systems. We also take forensic images of volatile data which are key in identifying who, what, why, when, where and how the incident occurred.

Vulnerability Assessment & Penetration Testing

The most precise method to estimate your organization’s information security stance is to examine how it stands up against a cyber-attack. Infinity forensics provides two main approach to tackle internal and external cyber security threats, Vulnerability Assessment & penetration testing.

A Vulnerability Assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability Assessment offers a way to find system backdoors, malicious code and other threats that may exist in network, operation system or applications.

A Penetration Test, is a service where we simulate a real world attack on network and computer systems using real-world tools and techniques in order to find security weaknesses.

During penetration testing we simulate an attempt at breaching your security so that you can fully appreciate the risks and the potential consequences of an intrusion. We identify specific risks to your business systems and data and provide proven mitigation strategies.

Our approach involves an active analyses on system design, operational strength and weaknesses, technical flaws, vulnerabilities and poor system configuration

Infinity Forensics’ proven, quantifiable, real-world approach to analysing security risk to infrastructure, applications, and employees is a core strategy for protecting our client’s data, privacy, and reputation. We offer expertise in network and application vulnerability assessment, penetration testing, application security, wireless penetration testing, mobile App, social engineering and compliance.

Our comprehensive report include of vulnerabilities and also recommend the best methods to secure the environment based on your unique internal business requirements and industry best practices.

Our Location

35 Tannery Road #09-05
Ruby Industrial Complex
Tannery Block
Singapore 347740
Tel : +65 68460654
Fax : +65 67411986
Email :  This email address is being protected from spambots. You need JavaScript enabled to view it.


Download Brochures

Computer Forensics
Mobile Forensics
Data Recovery
IT Security

Mobile Forensics

Infinity Forensics can recover live and deleted data from mobile phone handsets and SIM cards. Infinity Forensics can forensically recover all viewable data stored on the handset and SIM card using specialist forensic hardware and software. Our investigations are conducted in a shielding unit to prevent the mobile phone from connecting to the network ensuring no data is altered during the examination.

Infinity Forensics converts all phone specific media (such as deleted incoming, outgoing, missed call history – SMS/MMS/Email, Internet history, instant messaging deleted message recovery , WhatsApp, Line, Viber, Skype, videos and recordings) into a format view-able on any personal computer. We provide a detailed printout and compact disk containing the data. A forensics report also provided for court purposes.


Modern litigation places organizations at potential legal, financial and publicity risk if disclosure is not fully and correctly provided. Failure to comply with eDiscovery rules can be costly.

Infinity Forensics offers corporations litigation readiness programs, which are designed to reduce enterprise risk while improving the daily flow and management of critical information. Our team of internationally recognized e-discovery professionals have diverse backgrounds that include experience in law firms, major corporations and top technology and consulting firms. We can help you carry out a defensible and robust process for e-discovery that focuses not only on the technical tools, but also on the policies and procedures that support the process. We assist our clients in rapidly reducing large data sets to case relevant information which can be reviewed and produced in a structured manner.

Intellectual Property Theft

Infinity Forensics were asked to undertake a computer forensics investigation on a number of computers, laptops and mobile phones following the departure of 5 company employee from a large organisation. The departing had set up a rival business and the large organisation had noticed a distinct decline in trading activity. Infinity Forensics was able to prove that the departing employee had copied customer lists, supplier details including pricing and other important internal company information. Following the forensic investigation the large corporate were able to attain a court injunction to ensure the opposing company ceased trading pending a damages case.

Corporate Fraud

When an employee exits a company, it is essential to identify and preserve critical information that the employee possessed before it is lost forever, and to ensure that no sensitive data walked out of the door with the former employee. A financial services institution suspected a senior executive of submitting false expense reports.  Not only did Infinity Forensics provides irrefutable proof of the executive’s substantial expense account fraud, but was also able to provide proof that the executive routinely spent hours each day surfing work inappropriate websites.


Divorce - Hidden Assets

Investigations in family law or divorce cases include a vast array of issues that must be resolved; they key issues being financial responsibility.  In many cases, a spouse will attempt to hide assets in order to avoid relinquishing those assets in a divorce settlement. Through an in depth computer forensic investigation, hidden assets can often be discovered. In a divorce case, any incriminating evidence is most likely located on a mobile device - a smart phone, laptop or tablet (iPad). Digital forensic can recover, evidence of undisclosed bank accounts, credit cards, investments, property and other assets can often be recovered and used as evidence in a divorce case. 

Audio Forensics

Audio Forensics / Voice Investigation is analysing, and evaluation of sound recordings that may ultimately be presented as admissible evidence in a court of law. Establishing the authenticity of audio evidence & performing enhancement of audio recordings to improve speech intelligibility and the audibility of low-level sounds & interpreting and documenting sonic evidence, such as identifying talkers, transcribing dialog, and reconstructing crime or accident scenes and timelines.

Video Forensics

Video Forensic Analysis / Video Image Investigation is the scientific examination, comparison and/or evaluation of video in legal matters. Some of the examples as: perform clarification techniques such as frame averaging, highlight someone or something of interest in the video, enlarge portions of the video for areas of interest, image stabilization stabilizes unstable or shaky video, color correction tools are used to analyze and correct poor lighting and compensate for camera dome filters to recover the accurate colors of the scene, clarify dark and poor quality security and surveillance footage.


Vulnerability Assessment tests are a series of tests performed on a system to identify the vulnerability of the system. This is a Security Assessment conducted to understand the vulnerabilities and by this process the vulnerabilities are identified and exposed to the security experts who in turn are able to quantify and priorities such vulnerabilities.


With the uptake of cloud computing and the advancements in browser technology, web applications and web services have become a core component of many business processes, and therefore a lucrative target for attackers. Over 70% of websites and web applications however, contain vulnerabilities that could lead to the theft of sensitive corporate data, credit cards, customer information and Personally Identifiable Information. Infinity forensics examines your web applications from a coding and implementation flaw perspective, and also looks at other issues like SQL injection and cross-site-scripting (XSS), involving active exploitation of vulnerabilities in order to gain access.


Infrastructure & Network penetration testing is a proven and only way to identify weaknesses in computer networks and infrastructure. The primary objective for a network penetration test is to identify exploitable vulnerabilities in networks, systems, hosts and network devices before hackers are able to discover and exploit them. Wireless Penetration Testing covers all threat vectors of Wireless Networks. Our audits contain attempts to crack Wireless Encryption and Authentication mechanisms, include the setup of rogue access points along with test phishing portals, a variety of man-in-the-middle (MITM) attacks, Denial of Service Testing and Bluetooth Security tests. Infinity Forensics uses cutting edge wireless audit tools “NExSpectrum” tool from Nexvisionlab.

Why Infinity Forensics ?

Why Infinity Forensics (Private) Limited?

Infinity Forensics has a comprehensive range of computer forensics services to help organizations, and key individuals within those organizations, make informed decisions and mitigate potential electronic evidence risks. We have a highly experienced team of engineers and ways of working that are second to none. We have the experience, the knowledge and the tools required. Computer forensics has become increasingly important as fraud, financial irregularities, employee misconduct and commercial disputes threaten company finances and reputations while creating serious regulatory risks.

Utilizing state-of-the-art techniques, Infinity Forensics’s computer forensics specialists enable the recovery and use of critical electronic whether evidence has been erased or modified for litigation, investigations, audits and other fact-finding exercises.

Our Clients