
What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know […]

Oh yes, it is a small world – especially when you connect the dots on the Internet. Bloomberg writer Vernon Silver illuminated what happens when spyware is installed on a person’s computer. It’s done so quickly and almost without notice that the victim doesn’t realize until later that they have become a victim. Computer forensics […]

After the hustle bustle of the holiday season, most of us are ready to get back into our regular routines. However, I just read an article by Matt Gephardt at KUTV.com in Utah that there is actually a bump up in computer malware infections after the holidays – up to a 30% increase! That means […]

According to an article I read recently, the courts in different states have different views on the Computer Fraud and Abuse Act (CFAA). The case referenced was one in South Carolina in which an employee left the employ of one company but downloaded several proprietary files including pricing terms, pending projects and technical capabilities before […]

I almost laughed the other day when I ran across an article providing instructions on how to bury valuables. At first, I thought it would be a humorous piece, and started to share it here in the office. But then we realized that it was a serious, step-by-step guide to squirreling away valuables in the […]

There is one more reason to be glad you reside in the United States – cell phone spyware is illegal here. With the release of the Apple iPhone5 in Australia, cries can be heard about the “potential tsunami of privacy breaches” according to an article at news.com.au. The article quotes senior lecturer of Internet law […]

The use of cellular forensics has become a real tool for many attorneys and their clients – on both the defense and the prosecution sides of the courtroom. Although we conduct mobile device forensics or mobile phone hack detection for clients suspecting cell phone spying, we also conduct investigations using cellphone records and mobile phone […]

Have you heard the complaint that computers are de-personalizing interactions in the world? I do know it is easier to hide an identity behind a computer, but that doesn’t take the human out of the equation, that’s for certain. Nor does it prevent the truth to be revealed through computer forensic investigation and computer forensic […]

Did you ever think that your baby monitor could be a spy listening device? That’s right. With technology moving ahead, parents are able to connect to their baby monitors and while these eavesdropping devices are meant to keep baby safe, the can also end up being used as electronic surveillance by bad guys. How it […]

According to relationship expert Dr. Gilda Carl, 61% of spouses remain in marriages even when they suspect their husbands or wives are having an affair. Sadly, especially among women, they don’t have much beyond vague concerns of marital infidelity or have any evidence of their husband cheating. Don’t allow that to be the way you […]