Computer Forensics and Incident Response Awareness in the Commercial Sector
As businesses increase their online presence and dependency on IT, the number of incidents of computer misuse continues to rise. […]
Read MoreSpam, Phishing and the Dangers of Leaving a Mail Server Unsecured
Mass-distributed, unsolicited email is a growing problem, with a recent study estimating that ‘spam’ now represents 75% of all email […]
Read MoreProject EVE Allows New Zealand Police To Speed Processing Of Computer-Based Evidence
A new technology is changing the way computer-based evidence is identified. Launched in August 2009, Project EVE has enabled the […]
Read MoreComputer Forensics And The Rapid Increase In Hard Drive Storage Capacity
The storage size of the average hard drive is increasing rapidly. Five years ago, 100 GBP would have bought a […]
Read MoreWiFi Networks And Their Use In Computer Crime
Many of us now use wireless networking as part of our daily routine when it comes to using the Internet; […]
Read MorePassword Strength: The Need For Adequate Password Standards In The Workplace
Most computer users are aware of the need for passwords to protect sensitive data from unauthorised access, but few are […]
Read MoreMalware And Its Impact On The Investigation Of Computer Crime
When a person is suspected of using a computer in the course of committing an illegal activity, such as downloading […]
Read MoreData Recovery Techniques And The Myths Surrounding Data Wiping Tools
As the use of computer forensics in criminal investigations becomes more commonplace, news reports have made many ordinary computer users […]
Read MoreThumbs.db: How Computer Forensics Can Reveal Traces Of A Deleted Image
In recent years, initiatives such as Operation Ore have stepped up efforts to identify and prosecute those possessing indecent images […]
Read More