Cisco 2009 Midyear Security Report: Internet Criminals Get Organised
Friday 7th of May 2010
Criminals who use the Internet to fuel their illegal activities are becoming increasingly organised, with some adopting strategies from the […]
Read MoreNew Legislation Makes Possession Of Extreme Pornographic Images An Offence In England and Wales
Friday 30th of April 2010
On 26 January 2009, Section 63 of the Criminal Justice and Immigration Act 2008 came into effect, making it an […]
Read MoreFraud In Britain Doubles As Recession Stretches Staff Loyalties
Friday 16th of April 2010
The rate of fraud growth in Britain has nearly doubled in the past six months, according to the latest six […]
Read MoreUSB Flash Devices: The Small Gadget That Could Pose a Big Risk to Your Organisation
Friday 2nd of April 2010
USB flash devices, the small sticks used to store data, are becoming increasingly prevalent. Typically smaller than a pack of […]
Read MoreAirport Body Scanners Could Violate Child Pornography Laws
Friday 26th of March 2010
With airports across the world plagued by terrorists attempting to smuggle dangerous weapons and explosives on board flights, Britain is […]
Read MoreComputer Forensics And The Rapid Increase In Hard Drive Storage Capacity
Thursday 18th of March 2010
The storage size of the average hard drive is increasing rapidly. Five years ago, 100 GBP would have bought a […]
Read MoreThe Advantages And Disadvantages of Forensic Imaging
Friday 12th of March 2010
The investigation of crimes involving computers is not a simple process. In the vast majority of cases, the assistance of […]
Read MoreSoftAP: Is Windows 7 Creating A Hole In Your Network Security?
Friday 26th of February 2010
Windows 7 is the latest operating system from Microsoft and while it has proved a big hit with consumers and […]
Read MoreShould Digital Evidence Be Stored In Perpetuity?
Friday 29th of January 2010
Where it is suspected that a computer has been used in the commission of a crime, the equipment is usually […]
Read MoreCloud Computing And Computer Forensics
Friday 15th of January 2010
If a considerable proportion of your business operations are conducted via computer, it is likely that you use a range […]
Read More