Tags » Computer Forensics

Encoding in E-Discovery: Reductio ad Absurdum

In his keynote speech at the Zapproved Preservation Excellence Conference in Portland, Dr. Tony Salvador of Intel compared the “encores” of performers today to those of performers a century ago. 2,010 more words


Night Lion Security


The explosive nature of IT security threats continues to grow and capture mainstream headlines.
The majority of data breaches are caused by weak or stolen credentials, hacking, or malware. 31 more words

Computer Forensics

Dem Phones, Dem Phones, Dem iPhones

I am not a dinosaur.  Except that I prefer e-mail to texting, and I forget that my students have never used a record player or lived without the Internet.  1,183 more words


Are you Shellshock’d? {bashbug}

By: Kyle Cavalieri

On September 25, 2014, a new vulnerability that affects most versions of Linux and Unix operating systems, which includes Mac OS X, was discovered. 261 more words

Computer Forensics

A Brief History of Computer Forensics and the Improvements we can see Today.

Fraud is becoming an epidemic in today’s society.  One statistic says that a typical organization loses about 5 percent of its yearly revenues to fraud.  How are data scientists using technology’s latest advancements to help with the prevention of fraud?  620 more words

Computer Forensics!?

Lets talk about Computer Forensics. Chiefly, you must be clear that Forensics is a SCIENCE. Don’t get confused with other terms. It is a SCIENCE… 407 more words

Case Study

Cyber Breach – It will happen to you!

By Michael McCartney (michael.mccartney@digitsllc.com) is President/CEO of DIGITS LLC, in Buffalo, NY.

We have all seen the national news reports lead with the all too familiar story of another company being the victim of a cyber attack. 455 more words

Computer Forensics