Blog

Fitbit, Fun, Forensics, and Foes

Fitbit, Fun, Forensics, and Foes by Steve Burgess, 2018 Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are big business, helping people get and stay fit, and helping them share their progress with friends - and sometimes with...

How to Avoid Being Hacked, Part 1 – Email

How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is...

Keyword Searches

Keyword Searches

Computer Forensics Expert Steve Burgess explains keyword searches - what they are, how to design an effective search, and differences between electronic data discovery (EDD) and computer forensics.

Data Recovery Myths and Misconceptions

In the very early 80's, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data recovery...

Can You Browse the Internet in Secrecy?

By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...

Cyberbullying Law and Intervention

Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term "bullying," or "cyberbullying" to electronic harassment or bullying...

Pin It on Pinterest

Share This