Computer Forensics in Criminal Litigation

Posted by in Computer Security on 06. Feb, 2013 | 0 Comments

There are two facets to this area of practice. Support for the Prosecution, and support for the Defense. We are comfortable working in either area, although because law enforcement technical crimes units typically support the Prosecution, we are not often asked to be involved. However, we do offer our assistance to all law enforcement agencies. […]

Now You Can Encrypt Your Calls, Texts to Protect Them From Being Spied On | Video | TheBlaze.com

Posted by in Computer Security on 06. Feb, 2013 | 0 Comments

NOW YOU CAN ENCRYPT YOUR CALLS, TEXTS TO PROTECT THEM FROM BEING SPIED ON Feb. 6, 2013 1:44pm Liz Klimas 23 30 0 0 14 (Image: Silent Circle) There are those who might be concerned about spying — by the government, hackers or someone else — on their phone calls and text messages. Well, now there’s an […]

How to Devise Passwords That Drive Hackers Away

Posted by in Computer Security on 08. Nov, 2012 | 0 Comments

How to Devise Passwords That Drive Hackers Away – NYTimes.com. Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self. It’s hard to maintain peace of mind when hackers remind me every day, all day, just how easy it is to steal my personal data. Enlarge This Image […]

Top 10 Reasons to Hire a Private Investigator

Posted by in Computer Security on 21. Aug, 2012 | 0 Comments

You need information and it obviously isn’t the kind of information you can get on Google. The information you need may be sensitive, it may need to be kept confidential or used in a courtroom. Who is stealing from me? Did my suspect commit a crime? Can I trust this employee or lover? Is someone […]

Internet Honeypots

Posted by in Computer Security, IP Address Tracking on 18. Apr, 2012 | 0 Comments

A honeypot is a trap set to attract (or detect) some manner of interaction with an information system. FBI posts fake hyperlinks to snare child porn suspects The FBI has recently adopted a novel investigative technique: posting hyperlinks that purport to be illegal videos of minors having sex, and then raiding the homes of anyone […]