All in Investigations

Tag: computer forensic services

  • Don’t be a Victim to New Scam Techniques

    Don’t be a Victim to New Scam Techniques

    As much as we knew it was a possibility, we were still a little surprised here at to hear that scammers were pretending to be private investigators in a payday loan debt scheme. The incident cited at credit.com says that a caller saying he was a private investigator pressured the victim into going to the…

  • If You Are In Business, You Are a Potential Target for Corporate Espionage

    If You Are In Business, You Are a Potential Target for Corporate Espionage

    What do you do in your leisure time? Watch football or motor racing? That’s all fun, right? Don’t kid yourself. Major sports are major businesses and that means big money is at stake. And when big money is on the line, there are also people who will do anything to “win.” For example, consider the…

  • It May Start as a Joke, but Spyware on the Computer is Never Funny

    It May Start as a Joke, but Spyware on the Computer is Never Funny

    Proving innocence and proving guilt are opposite sides of the same investigative coin. Here at , we are concerned with facts, evidence and truth. That’s the investigative business. That being said, good investigators are also experienced professionals – and, I dare say, experts – in human behavior. It is that understanding of how people react…

  • Play Poker Online? Losing? There Might be a Reason!

    Play Poker Online? Losing? There Might be a Reason!

    Do you wile away your time playing poker online? How are you doing? Losing a lot? There might be a reason beyond your poor poker-playing skills. It’s been uncovered that several hundred online poker player’s accounts have been infected with malware called Odlanor. The bad guys are able to take screen shots of player’s hands…

  • Legality of Digital Forensics Critical for Admissible Evidence

    Legality of Digital Forensics Critical for Admissible Evidence

    Right now there is a big controversy stewing regarding whether or not authorities have the right to seize computers at the borders of the United States. There is a “border search exception” regarding the seizure of physical objects from travelers and some say it should extend to computers. The final decision on the legality and…

  • Are You Being Proactive about Cyber Attacks in Your Small Business?

    Are You Being Proactive about Cyber Attacks in Your Small Business?

    Small business owners have another growing trend to be concerned with in today’s online marketplace. Symantec reported that 30% of cyber attacks targeted small businesses. Not every cyber attack has to do with malicious threats or activities against a specific business or business owner. The fact is that some hackers simply want to cause a…

  • Forensic Data Recovery Reveals the Culprit

    Forensic Data Recovery Reveals the Culprit

    When Marcus reflected back on how he felt a few months ago, before his attorney hired a private investigator, his knees felt weak. For a long time, Marcus feared that he might never be able to prove the truth. He feared that he might be unjustly sentenced to a prison term. He worried that he…

  • Computer Forensic Investigations Overwhelm Authorities

    Computer Forensic Investigations Overwhelm Authorities

    In a recent article in The Police Chief, First Sergeant Charles Cohen, of the Indiana State Police identifies the challenges facing authorities in the field of computer forensics. He says that computer forensic investigators, detectives, and prosecutors all have similar lamentations: There is an unacceptable backlog of computers and devices waiting for examination. By the…

  • Computer Forensic Investigations Are on the Rise

    Computer Forensic Investigations Are on the Rise

    The use of computer forensics analysis is exploding. A recent video at Investigation.discovery.com provides a brief overview of what is possible, but it also shows that computer forensic investigation is not a do-it-yourself project – it takes a computer forensics specialist to root out the hidden bits of data that computer forensics experts know will…