Similar Posts

What Is Digital Debugging?
As spyware and malware software continues to evolve, the risk of “digital bugging” has never been greater. These “digital bugs” are designed to spy on your content or active keystrokes without the need for physical access to the network or your computer. “Digital Bugs” can be picked up on the Internet or unknowingly downloaded from…
Interview with Gary Huestis Mobile Phone Security Expert
Gary Huestis, Director of Digital Forensics with E-Investigations, Interviewed as a Mobile Phone Security Expert
Wire Transfer Fraud
E-Investigations, a Houston, Texas Computer Forensics and Investigations Firm Announces Case Study on Wire Transfer Fraud
The Legality of Computer Forensics
In a field that is seeing exponential growth, it’s incredibly important for experts to stay up-to-date on the legality of computer forensics. There are several matters at play here. The courts are quickly passing new laws that limit or change the access that computer forensics can legally obtain. The easiest way to stay abreast of…

What Is Data Culling?
Once a digital image of the device in question is acquired, the next step in the electronic discovery process is called Data Culling. During the data culling process, our digital investigators determine the types of files that can be recovered from the data. This information is gathered from email servers, file servers, home directories, and…
E-Investigations Opens New Computer Forensics Lab
E-Investigations Opens New Computer Forensics Lab