Michael Webber possibly has worked on the biggest cyber crime cases in the country. He might have helped authorities track down Albert Gonzalez, the hacker responsible for exposing tens of millions of ...
The fictional characters in the show NCIS are a whiz when it comes to using forensics to find digital evidence. In the real world, very few law enforcement officials have those skills, but that’s ...
LINDON, Utah--(BUSINESS WIRE)--AccessData Group, a leading provider of integrated digital forensics and e-discovery software, today announced that it is a member of a consortium that won a prestigious ...
From corporate theft to murder, computers often play a role in nefarious activity, requiring specialists with a mix of legal and technical expertise to gather evidence stored digitally. "If it's a ...
Time progresses and many things in life may change but, for the most part, crime remains constant. Law enforcement agencies must pursue new and different ways to combat the crimes that plague their ...
Get the latest federal technology news delivered to your inbox. As law enforcement officials across the country continue to struggle with growing cyber and electronic crime-related threats, two ...
CyberEvidence, Inc. is a recognized leader in computer forensics training and computer forensic investigation in the Houston, TX metro region. Since 1998, CyberEvidence, Inc., under the leadership of ...
A collaboration with 20 law enforcement officers from throughout Indiana Wednesday-Friday (8/11-13) is part of a new, federally-sponsored program designed to set national standards for computer ...
For a limited time you can download for free this 7 hour video training course to learn how to determine potential online criminal activity, legally gather evidence, search and investigate wireless ...
Police forensics training for Macs in Middletown, Delaware. If you’ve ever taken apart an Apple device, you know what delicate work it can be. Imagine trying to extract incriminating child pornography ...
Many IT departments have tools to detect and prevent corporate breaches, but oftentimes, key staff members may not have a good background in investigative computing techniques. Training staff in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results