Computer Forensics Blog

The purpose of our computer forensics blog is to provide our readers with engaging articles related to the field. We hope that all of our visitors are able to learn more about all facets of computer forensics, including what it takes to start a career and what is required of those already in the field.

Computer Forensics Tackles Many Types of Crime

The world of forensics is changing, and more and more law enforcement agencies are relying on computer forensics to help catch criminals. While other areas of forensics, such as crime scene analysis and ballistics are still very important and can provide physical...

Tropical Fruit Makes for Easy Access

From Starbucks to Panera Bread, Wendy’s to McDonald’s, almost everywhere you go has Wi-Fi available for those who are constantly on the go and in need of an internet hook-up. For those who use a few extra key strokes and mouse clicks to manually connect...

Dedicate Yourself to Computer Forensics Training for Success

The area of forensic science is very interesting, and many people believe that they want to have a career in this area. You will find many different types of forensics, but you will likely have one that sticks out to you as being something for which you are ideally...

Cybercrime Threats You Might Encounter

When it comes to cybercrime, there are countless varieties and variations out there and there seem to be new ones cropping up each day. Even when you try to be as safe as possible on the web, there is a chance – a good chance – you are going to have to deal with some...

Securing Your Integrated Webcam

Much has been publicized about the security breach of integrated webcams found in notebook computers. Some of this publicity is warranted; however, most of the risk can be mitigated by applying a few common sense practices. First, be sure the firmware for the camera...

Protecting Personally Identifiable Information

What is Personally Identifiable Information (PII) and how do we go about protecting it? PII is any information that can be used to identify, contact, or locate someone: name, gender, birth date, social security number, address (home or email), phone number(s), and...

Stopping Computer Viruses in Their Tracks

It’s all about just buying reputable anti-virus software, right? Yes and no. Having good, up-to-date anti-virus software is certainly key to helping prevent computer viruses, but it’s certainly not the only weapon of protection. The fact is that many...

“Brad Meltzer’s Decoded: “Mafia Alive?”

This popular show on The History Channel’s spinoff channel, H2, recently looked at organized crime and its evolution over the years, namely how organized crime has evolved with respect to evolutions in technology. Brad Meltzer had his team of investigators...

Hacking Into A Hotel Room

A thief hacked into a hotel room at the Hyatt House Houston Galleria in Houston, Texas, on September 7th and stole the room occupant Janet Wolf’s laptop. Ms. Wolf, who ironically enough is an IT services consultant for Dell Computers, returned to her room to...
Page 2 of 612345...Last »
RSS
Facebook
Facebook
GOOGLE
GOOGLE
http://www.computer-forensics-recruiter.com/blog/page/2/">