What is Cyberstalking? The first five entries in a Google search show five different definitions, but all agree that it has to do with the use of...
Search Results
Email as a signed contract vs. fraudulent emails
Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as...
Viruses
What are computer viruses, Trojans and zombies? Sounds like a horror movie, doesn't it? Computer viruses are bits of computer code (1's and 0's)...
Federal Rules of Civil Procedure and ESI The evolution of e-discovery and computer forensics, Part 2: Zubulake v. UBS Warburg
The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily...
Audio File Challenges for Computer Forensics & eDiscovery
By Steve Burgess Unified communications is the term used for integrating all communications - data and voice - over the Internet. This can include...
I’ve Been Hacked! What Do I Do Now?
We get this question several times a week, so itβs not just you. And no, it doesn't mean you're crazy β even if your friends think so, and even if...
CSI #17 – The Case of the Nuclear Hacker
I was taking a small midday break from my computer forensics lab to enjoy a few minutes of a sunny 75 degree June day in my Santa Barbara County...
Federal Rules of Civil Procedure and ESI: The evolution of e-discovery and computer forensics, Part I
Nearly all documents start on a computer and discovery for litigation necessarily requires accessing electronically stored information (ESI). Rules...
Why Does Digital Forensics Matter To Me?
Your data is not private! In the privacy of our studies, offices, libraries, or wherever it is we have our computers, it may seem that we are alone,...
The Supreme Court and Your Smartphone
Suppose you're pulled over because your left taillight is out, because your license plate tag is a bit out of date, or because one of your...