Similar Posts
The Legality of Computer Forensics
In a field that is seeing exponential growth, it’s incredibly important for experts to stay up-to-date on the legality of computer forensics. There are several matters at play here. The courts are quickly passing new laws that limit or change the access that computer forensics can legally obtain. The easiest way to stay abreast of…
How Do You Know If You’ve Been Hacked?
There’s been so much about hacking in the news recently, you may be thinking that everyone is vulnerable to hackers. What does it really mean to be “hacked”? How will you even know if it has happened to you? There’s some tell-tale signs that indicate that you could have been hacked. These may seem subtle…
Interview with Gary Huestis Mobile Phone Security Expert
Gary Huestis, Director of Digital Forensics with E-Investigations, Interviewed as a Mobile Phone Security Expert
The Benefits of Mobile Forensics
As the world becomes increasingly mobile, forensics experts are capitalizing on the complex digital growth. For this reason, the past practice of finger-on-ink is becoming rapidly replaced by the digital fingerprint. Each time a mobile user accesses the internet, cloud, or internal applications, they leave a trail of breadcrumbs in their wake. By accessing this…
What Is Data Culling?
Once a digital image of the device in question is acquired, the next step in the electronic discovery process is called Data Culling. During the data culling process, our digital investigators determine the types of files that can be recovered from the data. This information is gathered from email servers, file servers, home directories, and…
What Is Cell Phone Forensics?
There are many security concerns with mobile phone usage as mobile spyware programs can be easily installed and are very difficult to detect or remove. These spyware programs can gain access to your SMS (text) messages and enable automatic forwarding, as well as access your call history, voice mail, phone location, email, social media activity…
