
Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here […]

Computer forensics investigation is not solely limited to the big companies who fear corporate espionage. No, every business has access to cutting edge investigative techniques. Business had been growing for a small fastener manufacturing company. Their bids were consistently being accepted and their pipeline was running full. Until, that is, when all of a sudden, […]

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an […]

Computer data forensics recovery is possible in many cases. Take, for instance, the smashed computer of Adam Lanza, the perpetrator of the recent shootings in Connecticut. Even though he sought to prevent anyone from accessing the information on his computer by smashing it, depending on the damage, data could possibly be recovered. The computer forensics […]

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of […]

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer. With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee […]

Employers don’t often think they really need the help of a computer forensics consultant or a computer investigation in the normal course of business. However, when something just doesn’t seem “right” it pays to listen to your gut carefully. Case in point is a story recently reported by NPR. What began as a hint that […]

Corporate espionage is not new. Since the beginning of business, unscrupulous competitors have tried to steal trade secrets and proprietary information. They have used whatever technology was current at the time and now, with computers who knows where the limits will be or what will be next. computer forensics experts regularly provide computer forensics consulting […]

Apparently if you rent a computer from some retailers, you may be getting (or giving away) much more than you thought in the bargain. As computer forensics investigators, we are always watching for information about how bad guys can get into people’s lives on the sly. With computers the security loopholes are everywhere. So this […]

What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know […]