Computer Forensics Blog

The purpose of our computer forensics blog is to provide our readers with engaging articles related to the field. We hope that all of our visitors are able to learn more about all facets of computer forensics, including what it takes to start a career and what is required of those already in the field.

Utah Valley University

Utah Valley University

Focused on Computer Forensics - Utah Valley University A couple of months ago, we submitted a blog post titled, “Computer Forensics… How do I get Started?” In it, we shared some of the different ways in which a person might go about how someone begins a career in...

Bring Your Own Device Policy

Bring Your Own Device Policy

Many organizations are moving or have moved towards a policy that allows employee-owned devices to be used in the workplace. This policy is commonly referred to as a bring your own device policy (BYOD). There are other terms used to identify this policy as well, such...

Hillary Clinton’s Email Scandal

Hillary Clinton’s Email Scandal

Maybe using the term “scandal” in the title of this article might be a bit over-the-top for some. For others, it might not be harsh enough. In any event, the political nature and political implications of “Hillary Clinton’s Email Scandal” is not our focus. The focus...

Order of Volatility

Order of Volatility

One of the many procedures that a computer forensics examiner must follow during evidence collection is order of volatility. During the process of collecting digital evidence, an examiner is going to go and capture the data that is most likely to disappear first,...

Data Theft – The Growing Threat

Data Theft – The Growing Threat

The theft of information has been going on as long as humans have inhabited the earth and it was usually conducted under the act of espionage. Ancient civilizations discovered that the gathering of intelligence could provide a decisive edge over an enemy. For example,...

SSD Forensic Analysis

SSD Forensic Analysis

Flash storage has been around for quite some time now and it is in most of the devices we use on a daily basis. There is no doubt that your smartphone and your tablet are packing flash storage. And, it’s very likely that your laptop and even you desktop computer has...

Computer Forensics… How do I get Started?

Computer Forensics… How do I get Started?

Computer Forensics… How do I get Started? Everything has a starting point, even your career in computer forensics. I’m sure the question you’re asking yourself is, “how do I get started?” There’s really no one answer. It is highly advisable that computer forensics...

Australia Counters Cybercrime Threat with ACORN

Australia Counters Cybercrime Threat with ACORN

It is no secret that cybercrime is on the radar of businesses and governments across the globe. Every organization, whether it is a small business or a large government, has to take precautions to prevent being hacked, and the cost can be significant. Newsworthy...

Why Become an Information Security Analyst?

Why Become an Information Security Analyst?

It’s no secret that cybercrime is a huge problem out there and it just keeps getting worse. According to the Global State of Information Security Survey in 2016, which was provided by PwC, there was a 38% increase in security incidents from 2014 to 2015. Information...

Protection from Computer Crimes

Protection from Computer Crimes

Cybercrimes are costly affairs. Each year, cybercrime costs people and organizations billions of dollars, and some estimate that it actually reaches into the trillions. If these types of crimes haven’t cost that much yet, it’s just a matter of time. You have to...

Pin It on Pinterest

Share This