Tags » Computer Forensics

Preserving Gmail for Dummies

I posted here a year ago laying out a detailed methodology for collection and preservation of the contents of a Gmail account in the static form of a standard Outlook PST.  711 more words


Huge Cyberattack on JPMorgan Chase and Wall Street - How Far Does It Go?

Hackers’ Attack Cracked 10 Companies in Major Assault – NYT, by Matthew Goldstein, Nicole Perlroth, and David E. Sanger, New York Times, posted by… 298 more words

Legal Technology

Encoding in E-Discovery: Reductio ad Absurdum

In his keynote speech at the Zapproved Preservation Excellence Conference in Portland, Dr. Tony Salvador of Intel compared the “encores” of performers today to those of performers a century ago. 2,012 more words


Night Lion Security


The explosive nature of IT security threats continues to grow and capture mainstream headlines.
The majority of data breaches are caused by weak or stolen credentials, hacking, or malware. 31 more words

Computer Forensics

Dem Phones, Dem Phones, Dem iPhones

I am not a dinosaur.  Except that I prefer e-mail to texting, and I forget that my students have never used a record player or lived without the Internet.  1,183 more words


Are you Shellshock’d? {bashbug}

By: Kyle Cavalieri

On September 25, 2014, a new vulnerability that affects most versions of Linux and Unix operating systems, which includes Mac OS X, was discovered. 261 more words

Computer Forensics

A Brief History of Computer Forensics and the Improvements we can see Today.

Fraud is becoming an epidemic in today’s society.  One statistic says that a typical organization loses about 5 percent of its yearly revenues to fraud.  How are data scientists using technology’s latest advancements to help with the prevention of fraud?  620 more words