Quantcast
Channel: INFO[rmation fo]RENSICS
Browsing latest articles
Browse All 13 View Live

Image may be NSFW.
Clik here to view.

Weekly Highlights: September 17, 2012

Things You Might Have Missed Last Week (Highlights in legal, forensics, and electronic discovery news for the past week) Interesting Electronic Evidence Cases Inhalation Plastics, Inc. v. Medex...

View Article


Image may be NSFW.
Clik here to view.

Weekly Highlights: December 6, 2013

Hacker Server Storing Two Million Pilfered Passwords (From: Ars Technica)  Researchers have unearthed a server storing more than two million pilfered login credentials for all kinds of user accounts,...

View Article


Image may be NSFW.
Clik here to view.

Open Source Intelligence (OSI) and Your Case

Open Source Intelligence (OSI or OSINT) is intelligence collected from sources that are available publicly.  Much of the information fed to the internet by users, collected by advertisers, or otherwise...

View Article

Image may be NSFW.
Clik here to view.

Making Sense of “Heartbleed”: Information Security Catastrophe/Nightmare

The term “Internet Security Nightmare” has been used.  This is not an exaggeration, and not an example of hyperbole; Heartbleed is a security catastrophe that cuts a wide swathe across the internet. If...

View Article

Image may be NSFW.
Clik here to view.

Weekly Highlights: April 21, 2014

FRCP Rule 37(e) (Preservation) is Changing On April 11th, the Civil Rules Advisory Committee approved a  revision to Rule 37(e) (the section covers failure to preserve Electronically Stored Information...

View Article


Image may be NSFW.
Clik here to view.

ABA Issues Opinion on Social Media Ethics

The most common question in cases involving Open Source Intelligence (OSI) to support an electronic investigation, is: “To what extent may an attorney ethically use social media during case...

View Article

Image may be NSFW.
Clik here to view.

‘Shellshock’ In Plain English: Latest Security Vulnerability is a Big One

Many network administrators and information security folks are feeling the effects of the ‘Shellshock’ bug, this morning.  The bug has been confirmed as ‘worm-able’, and proof-of-concept code is...

View Article

Image may be NSFW.
Clik here to view.

Texas CoA Addresses Electronic Community Property and Invasion of Privacy

Reference: Miller v. Talley Dunn Gallery LLC, 2016 Tex. App. LEXIS 2280 (Tex. App. – Dallas March 3, 2016) (mem. opinion) (Cause No. 05-15-00444-CV) Relevant Documents: Memorandum Opinion:  March 3,...

View Article


Image may be NSFW.
Clik here to view.

It’s a Trap!! Infected Microsoft Word Files Exploiting Unpatched Vulnerability

A new virus is ‘in the wild’ that exploits a ‘zero-day’ vulnerability to infect or, worst case, wipe computers. The only known mitigation is to not download or view the infected files.  One may also...

View Article


Image may be NSFW.
Clik here to view.

Home Invasion Search Warrant: Two Knocks is One Too Many

(United States v. Juan Olaya, D-2, Case No. 15-cr-20200, EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION) On December 5, 2014 a group of 6 that was attached to a spree of home invasions was finally...

View Article
Browsing latest articles
Browse All 13 View Live