
Every single time couples smile and say “I do,” they are hoping to beat the odds that half of all marriages in this country end in divorce. There are many reasons why relationships go so sour, but one of the more prevalent reasons why couples race to divorce court is marital infidelity. Although studies show […]

Property division orders can be set aside at times post-divorce. It wasn’t too long ago that such a request was made in the state of New York. In this case, assets divided in divorce included a brokerage account with the infamous Bernie Madoff. The husband, who had given the wife a substantial settlement based on […]

Corporate espionage is not new. Since the beginning of business, unscrupulous competitors have tried to steal trade secrets and proprietary information. They have used whatever technology was current at the time and now, with computers who knows where the limits will be or what will be next. computer forensics experts regularly provide computer forensics consulting […]

I recently wrote about computer rental retailers that were caught illegally watching lessees’ activities and gathering data through computer monitoring software meant to keep track of rented computers. That sort of monitoring is illegal, but there is another type of monitoring that may fall into a gray area. Parents are monitoring their children’s cell phone […]

Apparently if you rent a computer from some retailers, you may be getting (or giving away) much more than you thought in the bargain. As computer forensics investigators, we are always watching for information about how bad guys can get into people’s lives on the sly. With computers the security loopholes are everywhere. So this […]

What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know […]

Oh yes, it is a small world – especially when you connect the dots on the Internet. Bloomberg writer Vernon Silver illuminated what happens when spyware is installed on a person’s computer. It’s done so quickly and almost without notice that the victim doesn’t realize until later that they have become a victim. Computer forensics […]

After the hustle bustle of the holiday season, most of us are ready to get back into our regular routines. However, I just read an article by Matt Gephardt at KUTV.com in Utah that there is actually a bump up in computer malware infections after the holidays – up to a 30% increase! That means […]

According to an article I read recently, the courts in different states have different views on the Computer Fraud and Abuse Act (CFAA). The case referenced was one in South Carolina in which an employee left the employ of one company but downloaded several proprietary files including pricing terms, pending projects and technical capabilities before […]

I almost laughed the other day when I ran across an article providing instructions on how to bury valuables. At first, I thought it would be a humorous piece, and started to share it here in the office. But then we realized that it was a serious, step-by-step guide to squirreling away valuables in the […]