
Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game […]

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an […]

So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have […]

Computer data forensics recovery is possible in many cases. Take, for instance, the smashed computer of Adam Lanza, the perpetrator of the recent shootings in Connecticut. Even though he sought to prevent anyone from accessing the information on his computer by smashing it, depending on the damage, data could possibly be recovered. The computer forensics […]

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of […]

Employers hire people with the best of intentions. They hope the new employees will become loyal and exemplary representatives of the organization. But sometimes it just doesn’t work out that way. Take for instance the case of a middle school teacher in Downers Grove, Illinois. According to a Chicago Tribune article, the teacher has resigned […]

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer. With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee […]

Employers don’t often think they really need the help of a computer forensics consultant or a computer investigation in the normal course of business. However, when something just doesn’t seem “right” it pays to listen to your gut carefully. Case in point is a story recently reported by NPR. What began as a hint that […]

Corporate espionage is not new. Since the beginning of business, unscrupulous competitors have tried to steal trade secrets and proprietary information. They have used whatever technology was current at the time and now, with computers who knows where the limits will be or what will be next. computer forensics experts regularly provide computer forensics consulting […]

Apparently if you rent a computer from some retailers, you may be getting (or giving away) much more than you thought in the bargain. As computer forensics investigators, we are always watching for information about how bad guys can get into people’s lives on the sly. With computers the security loopholes are everywhere. So this […]