Blog

How to Avoid Being Hacked, Part 1 – Email

How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is...

Keyword Searches

Keyword Searches

Computer Forensics Expert Steve Burgess explains keyword searches - what they are, how to design an effective search, and differences between electronic data discovery (EDD) and computer forensics.

Data Recovery Myths and Misconceptions

In the very early 80's, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data recovery...

Can You Browse the Internet in Secrecy?

By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...

Cyberbullying Law and Intervention

Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term "bullying," or "cyberbullying" to electronic harassment or bullying...

Federal Rules of Civil Procedure and ESI

The evolution of e-discovery and computer forensics, Part 3: The 2006 ESI Amendments to the FRCP The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily with paper, but with...

Pin It on Pinterest

Share This