How to Avoid Being Hacked, Part 1 – Email

How to Avoid Being Hacked, Part 1 – Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online...

Data Recovery Myths and Misconceptions

In the very early 80’s, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data...

Can You Browse the Internet in Secrecy?

By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...

Cyberbullying Law and Intervention

Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term “bullying,” or “cyberbullying” to electronic...

Pin It on Pinterest