Recent Posts
Mar 16, 2023
Digital Forensics Used in Employment Case to Uncover Fraudulent Texts Messages
Colleen Murphy at Law.com (signup required to read) recently published a report on an employment case involving text messages. The
Read MoreMar 09, 2023
Computer Manufacturer Acer Investigating Data Breach and Leak
According to a recent post on BleepingComputer.com, Acer, the Taiwanese computer and component manufacturer, has confirmed that it has experienced
Read MoreMar 07, 2023
Chick-fil-A Suffers Cyber Attack, Customer Data Affected
According to a recent article on Darkreading.com, Chick-fil-A, the popular fried chicken fast food chain, has revealed that it suffered
Read MoreMar 02, 2023
Key Digital Evidence Introduced in Trial Helps Lead to Conviction
Houston Harwood, of the Courier & Press, recently reported on digital evidence that was key in the second trial of
Read MoreFeb 28, 2023
Fox News & Dominion Voting Lawsuit: Electronic Communications Revealed
Recently there has been a lot of information about the defamation suit that Dominion Voter Systems has brought against Fox
Read MoreFeb 23, 2023
FBI Responds to Cybersecurity Incident Involving its own Child Sexual Exploitation Investigations
According to a recent article on The Register by Jessica Hardcastle, the FBI has confirmed that a cybersecurity incident recently
Read MoreFeb 16, 2023
Mobile Forensics and Cell Phone Evidence – What You Need to Know
Mobile forensics has become increasingly important in today’s digital age, where cell phones have become a ever-present part of our
Read MoreFeb 14, 2023
Employee Data Theft Investigations: Part Three – Mobile Device Evidence Artifacts
In part two of this series, computer evidence artifacts were covered and in part one the discussion on preserving devices
Read MoreFeb 09, 2023
Road Rage Murder Investigated Using Cell Phone Forensics
In a recent article for Fox17.com, author Jordan Whittington detailed the many ways mobile forensics was used to get a
Read MoreFeb 07, 2023
Is Someone Reading Your Texts?
We are often approached by folks who are concerned that others know too much about their communications, like someone is
Read MoreFeb 02, 2023
Employee Data Theft & Deletion Investigations: Part Two – Computer Evidence Artifacts
In part one of this series about employee data theft investigations, we discussed the need to preserve the device(s) of
Read MoreJan 31, 2023
Employee Data Theft & Deletion Investigations: Part One – Preserving Evidence
It happens frequently, and especially in current times where employees are leaving or being terminated from employment. Some may be
Read More