High-Tech Bank Heist Highlights Dangers Of Malicious Keyloggers
Two cyber-criminals were jailed today for their involvement in an attempt to rob a UK bank using stolen staff passwords. […]
Read MoreThe Responsibility of Firms to Secure Personal Information Under the Data Protection Act
As holders of client sensitive information, all businesses have a legal obligation to adhere to the Data Protection Act (DPA). […]
Read MoreComputer Forensics and Incident Response Awareness in the Commercial Sector
As businesses increase their online presence and dependency on IT, the number of incidents of computer misuse continues to rise. […]
Read MoreSpam, Phishing and the Dangers of Leaving a Mail Server Unsecured
Mass-distributed, unsolicited email is a growing problem, with a recent study estimating that ‘spam’ now represents 75% of all email […]
Read MoreProject EVE Allows New Zealand Police To Speed Processing Of Computer-Based Evidence
A new technology is changing the way computer-based evidence is identified. Launched in August 2009, Project EVE has enabled the […]
Read MoreComputer Forensics And The Rapid Increase In Hard Drive Storage Capacity
The storage size of the average hard drive is increasing rapidly. Five years ago, 100 GBP would have bought a […]
Read MoreWiFi Networks And Their Use In Computer Crime
Many of us now use wireless networking as part of our daily routine when it comes to using the Internet; […]
Read MorePassword Strength: The Need For Adequate Password Standards In The Workplace
Most computer users are aware of the need for passwords to protect sensitive data from unauthorised access, but few are […]
Read MoreMalware And Its Impact On The Investigation Of Computer Crime
When a person is suspected of using a computer in the course of committing an illegal activity, such as downloading […]
Read More