News

When Family Law, Forensic Analysis and an iPad Mix The use of a computer forensic expert to analyze potential evidence on personal electronic devices is very common in divorce litigation. March 15 ...
A professional forensic analysis of such use may uncover legal violations by the former employee despite attempts to conceal such actions.
I recently had the opportunity to perform some basic computer forensic analysis for clients who wanted to know if their computers had been used for "illicit" purposes. One client, the owner of a ...
BIRMINGHAM, Sept. 23, 2013 —Birdyshaw Private Investigation announced today that it has expanded into computer forensics, focusing on evidence found in computers and digital storage media. The ...
These files could be used for personal gain or sold to a competitor; in either case, the company suffers. Forensic analysis can aid in determining whether a file was copied onto an external device if ...
NIST SP 800-92, Guide to Computer Security Log Management, describes the need for inalterable log generation, review, protection, and management for performing forensic analysis.
In Chapter 5 of his new book File System Forensic Analysis, Brian Carrier discusses PC-based partitions, how they work and also takes a look at their data structure.
Paraben's Chat Examiner is a component of Paraben's P2 Forensic Collection of computer forensic analysis tools. This specialized tool focuses on the analysis and reporting of Internet chat logs ...
The Computer Forensics Analysis and Training Center, a non profit organization, will host a Career Day in Computer Forensics 10 a.m. – 3 pm., Saturday (Jan. 12) at the Delaware County Emergency ...