Quantcast

Latest Computer forensics Stories

2013-01-12 05:03:57

To prevent incidents of sabotage to company data (i.e. destruction, alteration or removal of proprietary information), businesses should make a habit of following certain key steps to ensure the company information is safe. E-Investigations has provided five very important steps to safeguarding a companies proprietary information. Houston, TX (PRWEB) January 11, 2013 Unfortunately for employers, employees often try to take work product with them when they leave, even under amicable...

2013-01-05 05:01:14

Network Investigation and Analysis has been a hot topic in Cyber Investigation, with the latest APAC cyber investigations training conference including Network Forensics as part of their training agenda. Nexusguard was one of the invited speakers at the event, showcasing the measures of Network Forensic against 3 cases of DDoS attacks. Hong Kong (PRWEB) January 05, 2013 Network Investigation and Analysis has come to the forefront of attention for High Technology Crime Investigation...

2013-01-04 05:02:15

The published roadmap provides a comprehensive outline of the new features to become available during the first quarter of 2013. In the course of the planned update, Belkasoft will add the ability to take volatile memory snapshots with a stand-alone tool, deliver the ability to share collected evidence between investigators at no charge, and introduce a free stand-alone tool for extracting information from public Facebook profiles. St. Petersburg, Russia (PRWEB) January 03, 2013 Belkasoft...

2012-12-19 05:04:26

From banking to staying in touch and almost everything in between, being plugged into the digital world, for many, is not only about personal convenience anymore, it has become an integral part of daily business functions as well. Joe Caruso, founder and CEO/CTO of Global Digital Forensics (GDF), took some time to discuss how he sees 2013 shaping up on the cyber frontier and how GDF will be positioned to serve client needs in the cyber security, electronic discovery (eDiscovery) and computer...

2012-12-14 05:01:42

Belkasoft updates its range of forensic products to version 5.1, adding features and improving the speed and stability of the products. All editions of Belkasoft Evidence Center received the update, offering investigators a faster, easier and more convenient way to work with digital evidence. St. Petersburg, Russia (PRWEB) December 13, 2012 Belkasoft Updates Evidence Center 2012 to v. 5.1 Belkasoft updates its range of forensic products to version 5.1, adding features and improving the...

2012-12-08 05:02:41

In light of the recent story about the manhunt for John MacAfee coming to a close on Tuesday due to his exact GPS coordinates being exposed by a hacker from a picture posted online, Joe Caruso, founder and CEO/CTO of Global Digital Forensics, sheds some light on how it happened and just how “smart” some of the devices people carry around every day have become, and how computer forensics professionals can help make sense of it all. New York, NY (PRWEB) December 07, 2012 To offer...

2012-12-01 05:02:59

E-Investigations has found that cases involving Non-Compete/Non-Disclosure, intellectual property and patent infringement computer forensic investigations can be re-examined using new computer forensics tools and updated hardware, software, and firmware. Often, deeds that were done years ago may be forgotten by the perpetrator, but remain on the digital device just waiting to discovered. Cold cases are often forgotten or are abandoned because the data was not recoverable; however, with the...


Word of the Day
snash
  • To talk saucily.
  • Insolent, opprobrious language; impertinent abuse.
This word is Scots in origin and probably imitative.