Related By Tag: mobile devices

What is Two-Factor Authentication?

What is Two-Factor Authentication?  Two-factor authentication requires a user that is logging onto a computer network or cloud service Internet provider, to have more than one means of proving who they are. Ergo, simply knowing a single password that you can remember won’t provide access without having a second factor to prove your identity. Two-Factor[…Read More]

Capturing a Cellphone Thief with Software

An interesting story today in the Chicago Tribune might help you learn to protect yourself from luring eyes and thieves who try to take your cell phone or gain access. After a user fails to type the unlock passcode correctly three times, software applications can take a picture of the person and email it to[…Read More]

Lost or Stolen iPhone? Tips from a Computer Forensics Expert

Losing an iPhone can be a stressful experience for anyone who depends on their phone for ongoing work and personal communications. The loss of irreplaceable photos that haven’t been backed up as well as music and other multimedia content can pose much pain for devoted iPhone users. There are a few things a user should[…Read More]

Illinois House OK’s Citizen’s Right to Record Police While on Duty

Recently, the Illinois House approved House Bill 3944 which amends the Illinois Eavesdropping Act. Currently, a citizen can be charged with a felony if he or she record the audio of a police office acting in the line of duty without their knowledge. Cell phones and smart phones today allow for the capture of video[…Read More]

7th Circuit Proposes New Standing Orders for ESI

Beginning October 1st, 2009, the Seventh Circuit Electronic Discovery Pilot Program entered it’s Phase One Implementation and Evaluation period. During the seven months from now until May 1st, 2010, individual Seventh Circuit judges have agreed to adopt new principles concerning the discovery of electronically stored information (ESI) and implement them in select cases. “The Principles”[…Read More]

An Ounce of Prevention

There is an adage that says “an ounce of prevention is worth a pound of cure.” When it comes to the protection of trade secrets and/or intellectual property, this is doubly true. Many companies are being forced by legislation or contract to implement an effective incident response plan; the truly wise also consider preventing incidents[…Read More]

What is Storage Media?

Storage media are devices that store application and user information. The primary storage media for a computer is usually the internal hard drive. Most internal drives are regular IDE hard drives that come with the computer. A removable drive is another popular storage device that is usually connected by firewire, USB, or parallel port (e.g.[…Read More]

Two Charged in Conspiracy to Steal GM Trade Secrets

DETROIT, MI: July 22th, 2010: Two Michigan individuals were charged with “conspiracy to possess trade secrets without authorization, unauthorized possession of trade secrets, and wire fraud” according to a federal indictment unsealed by the FBI. The indictment spanned the time period from December 2003 to May 2006 and details how the defendants “conspired to possess[…Read More]

Computer Forensics Leads to Indictment in Lombard Child Pornography Case

LOMBARD, IL: June 7th, 2010: Keen computer forensic work by the Lombard Police Department and the FBI’s Regional Computer Forensics Laboratory led to the indictment of a 25-year-old Lombard man. Kyle Olsen was indicted on four counts of transporting child pornography and one count of possessing child pornography by a federal grand jury. Officials seized[…Read More]