Computer forensics is a slow process. Examiners typically embark on a tedious file review process to determine each file’s relevance to a particular case. This can quickly add hours and extra costs to ...
In previous articles, I’ve discussed log management and incident response in the age of compliance. It’s time to cover a separate topic that has connections to both log analysis and incident ...
COURTHOUSE – One can learn a lot about people by examining their computer hard drives, according to Montgomery County Detective Ray Kuter, a seasoned investigator who heads up the Computer Forensic ...
Many companies require employees to sign agreements promising not to misuse their confidential business information. When an employee subject to such an agreement departs for a competitor, how can the ...
The Computer Forensics Analysis and Training Center, a non profit organization, will host a Career Day in Computer Forensics 10 a.m. – 3 pm., Saturday (Jan. 12) at the Delaware County Emergency ...
I recently had the opportunity to perform some basic computer forensic analysis for clients who wanted to know if their computers had been used for "illicit" purposes. One client, the owner of a ...
Every now and then, forensic experts or just curious novices will have to investigate technologies using tools that are not always readily available. For that reason, this post explores simple ways ...
In too many cases, computer forensics firms are called in midway through litigations only to find that key evidence is beyond their grasp, unattainable because of discovery deals that had been struck ...
Michael Berkovits, special counsel for Cooley’s litigation department, authored the below article for Bloomberg Law. Cooley’s Michael Berkovits says lawyers working on an intellectual property dispute ...
Listen to the Computerworld TechCast: Computer Forensics. The television series CSI has given millions of viewers an appreciation of the role and importance of physical evidence in conducting criminal ...
Computer Forensics Lab specialises in digital forensic investigations involving collection, examination, analysis and reporting of digital evidence stored in computers, mobile phones, memory sticks ...