Computer Forensics Blog

The purpose of our computer forensics blog is to provide our readers with engaging articles related to the field. We hope that all of our visitors are able to learn more about all facets of computer forensics, including what it takes to start a career and what is required of those already in the field.

Credit Union Infected by Its Own DVR

Credit Union Infected by Its Own DVR

It was recently announced that a credit union, whose identity and location were withheld, became a victim of its very own infected DVR. Thinking they had become the victim of an outside attack, the credit union had actually posted a warning to its customers on their...

Defining Cybercrime

Defining Cybercrime

It's a very commonly used word these days, but what exactly is cybercrime? According to www.technewsdaily.com, cybercrime is defined as, “Any action that uses a computer as a weapon or an accessory in crime, or when a computer serves as the target of the act being...

When Facebook Overstays Its Welcome

When Facebook Overstays Its Welcome

The writers at a website called TechNewsDaily.com recently published an article called, “When It's Time to Leave Facebook”. In this article, they discuss the different kinds of Facebook users: the ones who access their accounts a multitude of times every day to get...

Another College Victimized By Hackers

Another College Victimized By Hackers

A Florida college recently became the next publicized victim of computer hackers. Birth dates and social security numbers were stolen from some 300,000 students and employees of Northwest Florida State College in early October. It is known that at least one hacker...

Pinterest Makes Drastic Changes to Privacy Policies

Pinterest Makes Drastic Changes to Privacy Policies

In an effort to make the site a more secure place to socially network, Pinterest recently implemented several changes to its privacy and security policies. These changes will seem very familiar to account holders because they are very similar to Facebook's current...

Gathering Computer Data to Solve Crimes

Gathering Computer Data to Solve Crimes

A plethora of information can be gathered from a computer that has been implicated in the commission of a crime, but it takes people who are specifically educated and trained to extract this data and make sense of it, and computer forensics investigators are those...

Banking Trojans: The Stuff of Greek Mythology and Identity Theft

Banking Trojans: The Stuff of Greek Mythology and Identity Theft

Malware, viruses and spam are all but household words in this age of technology, but one type of cyber-crime may be one that not many people have heard of: Trojan horses. Experts say that Trojan horses are the most commonly used form of cyber-crime today, and the most...

Cyber Attack Steals Personal Information in South Carolina

Cyber Attack Steals Personal Information in South Carolina

Several weeks ago, on October 10th, the South Carolina Department of Revenue became the victim of a widespread cyber-attack that resulted in the theft of over 3.6 million social security numbers and the personal information and details for over 387,000 credit and...

Law Enforcement Using Their Own Cell Phone Towers to Solve Crime

Law Enforcement Using Their Own Cell Phone Towers to Solve Crime

The FBI has been using their own cell phone towers as an aid in solving crimes for more than fifteen years. These data collection devices, called Stingrays, allow them to collect data from cell phone towers without having to rely on the cell phone companies to provide...

Children Taking Cyber Security Tips from the FBI

Children are learning about computer safety and how to protect themselves from cybercrime at a very early age, thanks to a new program developed by the FBI. The program, called the FBI-SOS Safe Internet Challenge (SOS stands for Safe Online Surfing), is geared towards...

Pin It on Pinterest

Share This