Computer Forensics In Action
Evidence Spoliation — During an internal investigation, two executives were ordered to turn their laptops over to the company's outside counsel……
Intellectual Property Theft — A professional staffing firm relied heavily on the use of a single spreadsheet that contained information on prospective……
Laptop Compromise — A financial service firm's IT personnel installed remote access software with a weak password on an executive's laptop……
Instant Messaging Alibi — Law enforcement requested insight on a criminal case that involved a gang-related assault and battery outside of a high……
Source Code Theft — A software developer was alerted by one of their customers that a post had been made to an online forum, in a foreign……
IT Gone Rogue — An IT Director noticed that his network engineer, who was involved in a back-pay dispute with the company, was reading the HR……
Server "Crashing" — A retail company's IT staff were unable to access their mail server which was hosted by a third party. The company first suspected……
Date and Time Manipulation — An individual sued his former employer for wrongful termination related to a whistle blowing complaint……