Expert Witnesses in Digital Evidence, Accident Reconstruction, Commercial Trucking and more!
Evidence Solutions, Inc.
Tucson, Arizona 85733
https://evidencesolutions.com
► Contact Evidence Solutions, Inc.
Expert WitnessForensic ExpertLitigation SupportSpeaker
With centuries of combined expertise, our trusted team of experts provides consulting in Digital Forensics, Commercial Trucking, Accident Reconstruction, Human Factors, Law Enforcement, Transportation Safety, Sports & Fitness Safety, Occupational Therapy, Clinical Psychology, Real Estate, Greek Fraternity, Product Failure, & more.
We provide the highest quality written reports, depositions, and testimony based on thorough investigations. Decades of experience make us adept at the technical aspects of evidence retrieval and analysis, but what truly sets ESI apart is the ability to explain complex evidence to a jury. Our experts enjoy their work and often serve as faculty for CLE presentations to assist attorneys and judges in their practice.
Services
Evidence Solutions, Inc. offers the following services:
- Accident Reconstruction
An Accident Reconstruction Expert Witness investigates, analyzes, and draws conclusions by relying on physical evidence found at the scene of the accident to determine the cause and other contributing factors. Physical evidence used in the analysis can include but is not limited to the vehicles involved in the crash, skid marks on the road, and pictures taken of the scene. Digital evidence, such as the data recorded by devices found in vehicles such as the Event Data Recorder (EDR), Airbag Control Module (ACM), or Infotainment System can assist in the reconstruction process by providing insight into what occurred before, during, and after the accident. Physics and engineering principles are the basis for these analyses and may involve the use of software for calculations and simulations.
- Aviation
An Aviation Expert Witness can provide consulting and evidence analysis for issues involving aircraft, including accidents, regulatory issues, and insurance claims. They can draw from their extensive knowledge and experience in the field of aviation to opine on a wide variety of aspects.
- Cell Phone Forensics
A Cell Phone Forensics Expert Witness recovers data from mobile devices under forensically sound conditions, analyzes that data, and presents their findings. They may also analyze Call Detail Records that are acquired from cell phone carriers. Analyzing the data from the mobile device, the records, or preferably both, allows an expert to uncover and report on data that would not be available to the owner of the device, their attorneys, or courts of law. Beyond analysis and expert testimony, our experts can assist with acquisition protocols, subpoena documents, and advise on other potential sources of relevant data.
- Commercial Trucking & Transportation
Incidents involving commercial trucks and fleet vehicles can be extremely complex, and our commercial transportation experts will add a level of clarity and expertise to a case. Whether the accident occurred while the vehicle was being driven, loaded, unloaded, or otherwise, there are extensive industry standards and regulatory compliance issues to explore. Determining whether or not a lack of compliance led to the resulting incident is paramount in determining the next steps in a case, and our experts are here to assist.
- Human Factors
Our human factors experts apply their knowledge of human attention, perception, and decision-making to evaluate a person's actions under various circumstances. For example, human factors experts conduct scientific investigations and apply reliable human factors principles and methods to cases involving motor vehicle crashes, premises safety, and product design.
- Digital Evidence
Digital Evidence is virtually everywhere, from personal smartphones and computers to expansive corporate networks and public surveillance devices. Our team of Digital Evidence Experts is highly experienced in navigating this extensive landscape, and can assist with pinpointing the data that should be available, acquiring said data in a forensically sound way from a wide range of digital devices, analyzing that data, and explaining what that data means in a way that anyone can understand.
- Greek Fraternity
Do you have a case involving a Greek Fraternity? Our Greek Fraternity Expert Witness can speak to liability arising from injuries or deaths sustained at chapter-sanction activities, whether they are hazing rituals or general parties. The web of potential responsibility can be complex, including individuals, chapters, universities, and national organizations – our Greek Fraternity Expert can help you sort out where the liability ultimately falls, and speak to the Greek Fraternity's liability (or lack thereof).
- Law Enforcement
Law Enforcement Expert Witnesses play a crucial role in offering insights into various aspects of Law Enforcement and Public Safety. A highly qualified expert in this field can conduct a thorough analysis of a case, evaluate whether the appropriate standard of care was adhered to, provide deposition, and testify in court. Our experts commonly address issues such as claims related to the use of force, internal police procedures, training protocols, equipment failures (including electronic stun guns), dispatching procedures, and other relevant concerns.
- Real Estate
The business of buying, selling, leasing, renting and improving real estate is multifaceted. Whether land is commercial, residential, multifamily, partially improved or platted, real estate properties of any type can become the subject of complex disputes. A Real Estate Expert Witness is equipped to handle a wide range of real estate disputes, providing insight into expected standards of care within the industry. They can provide a level of clarity and in-depth analysis that can meaningfully help advance your case.
- Sports & Fitness Safety
An expert witness specializing in Sports & Fitness Safety can assist in cases encompassing claims of personal injury resulting from inadequate safety features or protocols, expected standard of care, and equipment failures. A Sports Expert can opine to the court regarding what led to the injury, who is ultimately responsible, or the legitimacy of a particular claim.
Litigation Support Services
- Technical Expertise
Our goal at ESI is to help our clients acquire and employ all the available information in a case. ESI's experts are adept at evidence retrieval, analysis, preservation, and presentation.
- Written Reports
ESI's experts provide the highest quality written reports that clearly and succinctly explain complex evidence and industry standards to both legal teams and a court of law. Expert reports are based on thorough research and investigations and are meticulously reviewed to ensure accuracy and reliability.
- Testifying Experts
Drawing on decades of specialized knowledge and expertise, our team of Expert Witnesses offers credible, impartial testimony based on well-founded opinions during depositions or trials.
- Electronic Discovery
As leaders in digital evidence, our team understands the significance of eDiscovery in modern litigation. Through our partnership with Indexed I/O, we provide eDiscovery services to help your firm cut costs, review data faster, and improve accuracy. Services include data processing and preservation, data review and analysis, data production and presentation, and more!
- Password Cracking
Our digital forensics team provides cutting-edge mobile passcode-breaking services that can break 85% of 4-digit codes in 3 days, and 85% of 6-digit codes in 9 days.
- Speaking Engagements
Our Experts are passionate about their respective fields and enjoy teaching attorneys valuable insights and skills useful in litigation. We serve as faculty for continuing legal education seminars for attorneys across the country.
Areas of Expertise
- Accident Reconstruction
- Audio Analysis
- Aviation
- Black Box
- Brakes
- Car Accident
- Cell Phone
- Cell Phone Forensics
- Civil Rights
- Commercial Real Estate
- Commercial Trucking
- Computer
- Computer Crime
- Computer Failure
Additional Expertise:
Black Box/EDR/EMR Forensics, Electronic Medical Records Forensics, Electronic Health Records Forensics, Audio & Video Authentication /Analysis /Enhancement, Sports & Fitness Safety, Product Failure, Computer Security, Cybercrime Investigations, Internet, Software Engineering, Telephony, Transportation Safety, Wireless Technology, Greek Fraternity.
Profile
Evidence Solutions was founded by Scott Greene who has been helping attorneys, judges, companies, and private individuals meet the challenges of the swiftly evolving technology industry for over 40 years.
ESI has since become a leading provider of Forensics and Expert Witness services. We pride ourselves on offering our clients a team of trusted, highly qualified experts with a diverse range of expertise in Digital Evidence, Human Factors, Commercial Trucking, Accident Reconstruction, Law Enforcement, Cybersecurity, Transportation Safety, Sports & Fitness Safety, Real Estate & more.
We prioritize client satisfaction by tailoring solutions to meet the unique needs of every case, whether you're a plaintiff, defendant, attorney, judge, or corporation. Our unwavering dedication to quality is evident in our meticulous research, analysis, and preparation, earning us a reputation for delivering credible, unbiased, and authoritative testimony.
Areas Served
All States. Nationwide. International.
More Information
Digital Evidence Expert Witness
Commercial Trucking Expert Witness
Accident Reconstruction Expert Witness
Law Enforcement Litigation Support
Cell Phone Forensics Services
Contact Evidence Solutions - Expert Witness
Evidence Solutions, Inc. in the Social Networks
Facebook Twitter LinkedInLegal Experience & Services
Our experts have provided expert testimony in depositions, civil plaintiffs, civil defense, and criminal defense cases in both state and federal courts. For Rule 26 information, please contact us directly.
Affiliations
American Bar Association - Affiliate Member
State Bar of Arizona - Affiliate Member
New Jersey Association for Justice, Partner
American Association for Justice, Affiliate Member
Sage ACCPAC, Dealer & Certified Consultant
Novell, Partner
Timeslips, Certified Consultant
HP / Compaq, Partner
The Medical Manager, Independent Sales Office
Symantec, Partner
Computer Associates, Partner
Microsoft, Partner
OnTrack, Partner
Seagate Disk & Tape, Partner
Cisco, Partner
Sfile, Partner
Linksys, Partner
Websense, Partner
Qualifications
See expert profiles on the Evidence Solutions website for a list of expert qualifications.
Seminars & Training
See expert profiles on the Evidence Solutions website for a list of expert training.
Publications
See website for the extensive list of publications.
Articles Published by Evidence Solutions, Inc.
Drowsy Driving: Exploring Sleep Deprivation, Fatigue, and Hos Regulations in Trucking Incidents
In 2017, the National Highway Traffic Safety Administration (NHTSA) estimated that there were approximately 91,000 police-reported crashes involving drowsy drivers which led to an estimated 50,000 people injured and nearly 800 deaths. From 2011 to 2015, NHTSA estimated that drowsy driving was involved in 2.3 to 2.5 percent of all fatal crashes nationwide. However, there is a consensus across the traffic safety, sleep science, and public health communities that these crash statistics significantly underestimate the impact of drowsy driving on crashes. For example, the AAA Foundation for Traffic Safety estimated that sleepiness is associated with 21% of all motor vehicle crashes in which a person was killed and 13% of those requiring hospitalization which result in 328,000 police-reported crashes, 109,000 injuries, and 6,400 deaths in the United States each year.
Read ArticleGPS Records in Litigation: More Precise Evidence Than Ever Before
Electronic GPS records have emerged as pivotal evidence in legal cases, shedding light on the sequence of events and providing a nuanced understanding of incidents. Depending on the data, GPS evidence pulled from various locations can be more exact than traditional cell tower triangulation approaches. Three recent cases investigated by ESI’s digital forensics experts pulled GPS data from different sources: Phone Apps, GPS dashcam devices, and Google take-out records. In each of these instances, the GPS evidence played a crucial role in establishing facts, proving innocence, and promoting justice.
Read ArticleBeware of Phantom Hacker Scams Targeting Seniors, Warns FBI
The FBI warned about a quickly growing nationwide scam specifically targeting older individuals, as 66% of victims are age 60 or over. These scams are known as "Phantom Hacker" schemes and are a new variation on a previously rampant form of tech support fraud. The threat actors will pose as tech support personnel, bank representatives, or government officials, quickly gaining the target's trust. Losses to this scam exceeded $542 million in the first half of 2023 alone.
Read ArticleHow to Spot a Hacked Electronic Device - and What to Do About It
As a Digital Forensics company, we receive frequent inquiries from people who believe their devices have been hacked. In some cases, it becomes quickly apparent that the person reporting the hacking may be imagining some or all elements of it (especially when the FBI is claimed to be involved). However, that does not change the fact that there are 100% legitimate instances of hacking, and it is essential to be aware of the warning signs that someone may be accessing your devices without your knowledge. Here are some indicators that your electronics may have been compromised - and what to do about it:
Read ArticleComputer Forensics Expert: The Sedona Conference Proclamation: December, 2014
Sedona Conference published the third edition of the "The Sedona Conference Cooperation Proclamation: Resources for the Judiciary."
Read ArticleAre E-books Ruining Your Sleep?
With the holiday season behind us, hopefully you are all using those fun and interesting electronic gifts you received. One of those gifts might be a tablet or e-reader, but beware it could have an adverse effect on your sleep cycle. Specifically, backlit e-readers and tablets should not be used before going to sleep, says a new study from the Cambridge, Massachusetts based Harvard Medical School.
Read ArticleCellular Phone Batteries 5 Things You Should Know
It seems like there are as many rumors about how you should be charging your phone and how to make that battery last longer. These are just a few of the myths that we hear most often.
Read ArticleDid Mesa, Az Police Botch the Arias Case?
For those unfamiliar with the case of Jodi Arias in Arizona,she was arrested and later found guilty of the murder of Travis Alexander in 2008, she is currently facing the death penalty. The nitty gritty of the case aside,the defense hired a Computer Forensics expert to examine a computer which belonged to the victim.
Read ArticleWill Fitbit and Crowdsourcing Change Personal Injury Cases?
One of the main items taken into account when considering how to price a settlement for a personal injury case is: what is the economic value of loss of ability to work or lead a normal life? In many cases it’s based on conjecture. In terms of working it can be a simple calculation of dollars per hour of work missed sometimes a little extra, but how can you quantify compensation for someone who seems relatively normal?
Read ArticleGoodbye Google Glass, We Never Knew You
It looks like the new and highly publicized Google Glass wearable device is sliding down into the depths of failed technology. It joins these other failed products like the Segway, which failed due to low consumer demand and the Hewlett Packard TouchPad which failed due to incompatibility.
Read ArticleData Breaches & Education Are Increasing
The Ponemon Institute, headquartered in Traverse City, Michigan, recently released their data breach survey which surveyed over 500 executives in the United States about how they think their company would respond to a breach. Last year when they completed this survey, about 61 percent of companies said they had data breach response plans in place for such an event. This year that percentage has increased to 73 percent.
Read ArticleSocial Media Forensics Expert Witness: Anonymous Facebook Usage
Facebook has become a veritable giant in the world of social media. Although they have not been quite as successful with their recent IPO as originally planned, they still raked in over $3 billion in revenue this past year, not bad for a website. Now they are taking their service one step further in an unprecedented move to an anonymous social media.
Read ArticleCell Phone Triangulation – The Basics
Cell phones have an amazing amount of data on them:pictures, call logs, contacts, text messages, etc. One of the things that most modern cell phones have is GPS (Global Positioning System) data. GPS information allows one (or anyone else for that matter) to find out where you are in the world. But what if you don’t have GPS? Your phone still knows where you are, albeit only roughly.
Read ArticleWorry About IT Personnel First, Then Worry About Hackers
In late 2014, the Municipal Bond Insurance Association experienced a breach in security when a large amount of customer data was found through a Google search. The UCLA Health System had a similar issue which involved patient communication records. The Pentagon Defense Information Systems Agency had a database with contractor data which was exposed.
Read ArticleFour Common Computer Security Myths
We’ve all heard them, those little snippets of information that you heard from a friend who got it from a friend of a friend of a friend.Let us separate a little fact from fiction once and for all.
Read ArticleWhy Should I be Concerned About Cyber Security?
In an increasingly cyber-world, many experts believe that the United States is not prepared for a sophisticated cyber-attack. Every day we get closer to a potential cyber disaster.
Read ArticleUnmanned Aircraft Systems and Drone Practice Groups Popping up Across the Country
While Amazon is working to develop “Prime Air”, the FAA and other groups battle over the use of Drones. Prime Air’s goal is to deliver products to Amazon’s customers within 30 minutes of the product being ordered. Meanwhile,the Federal Aviation Administration is not expected to establish final rules for commercial drone use until late 2015.
Read ArticleApple Has a Kill Command, Soon Google & Microsoft Will
California is putting pressure on cell phone manufacturers to integrate a “Kill” function into their cell phone operating systems (OS). It appears that the pressure from State and Federal law enforcement officials is working on Google and Microsoft.
Read ArticleWhy You Should Pay Attention to Data Breaches.
Safenet, a large data security company based in Belcamp, MD, recently released a report at the RSA Conference. The RSA conference is sponsored by RSA the Security Division of EMC, which is based in Hopkinton MA. The report titled: “Data Breach Level Index” contains some very interesting statistics about data breaches. Here is a summary:
Read ArticleDelaware Adopts Law Allowing Social Media Accounts to be Inherited
Recently, Delaware became the first state to enact a law that ensures families’ rights to access the digital assets of loved ones during incapacitation or after death.
Read ArticleWhy Electronic Medical Records are Attractive to Hackers
Part of our Forensics practice at Evidence Solutions,Inc. includes Electronic Medical Record (EMR) / Electronic Health Record (EHR) forensics. We take special interest in finding out about hacking events that affect Electronic Medical Record (EMR) Systems.
Read ArticleThree Big Data Breaches Announced
These three significant breaches highlight just how vulnerable U.S. private networks are to black hat hacker threats. The massive data breach of Target in the last quarter of 2013 generated tremendous concern for PII. Despite all the attention and concern generated by the massive data breaches of the last year, many companies still appear unprepared to detect and mitigate network intrusions.
Read ArticleCopy-and-Paste Creates Inaccurate Electronic Medical Records (EMR)
Federal officials say the copy-and-paste features common to computers which are used to enter Electronic Medical Records (EMR) and Electronic Health Records (EHR) invite fraud. Merely copying and pasting another patient’s clinical notes can be considered fraud. The Federal Government believes there is a need to reduce the healthcare provider’s ability to duplicate notes.
Read ArticleHow to Beef Up Your Travel Security and Stay Safe This Summer
One of our experts was notified by a friend that her laptop had disappeared at an airport security screening checkpoint. Never to be seen again. Yikes! It is a good reminder we need to be extra vigilant while traveling.
Read ArticleTrends in Technology 2014
2014 was certainly a year to be remembered, from politics to the people who were born and died, it will be a difficult year to forget. From a technology standpoint, it is also nothing to shake a stick at. The ever anticipated 2014 Internet Trends report from Kleiner, Perkins, Caufield and Byers (KPCB) a venture capital firm located in Menlo Park, California in Silicon Valley, was released in late May of 2014.
Read ArticleDivorces Fueling Spy Technology Sales
Evidence Solutions, Inc. has first hand experience which indicates spying on one’s spouse is on the rise. It is not unusual for us to receive a request to download the data from a spouse’s cell phone. We also receive many requests to review a spouse's computer system that may contain evidence of hidden assets.
Read ArticleData Breach Laws Across the United States & its Territories
Shortly after Target’s massive data breach in December of 2013, Attorney General Eric Holder released a statement encouraging the United States Congress to pass a federal law which would become the standard for data breach notification. "This would empower the American people to protect themselves if they are at risk of identity theft," Holder said in the statement.
Read ArticleP.F. Changs: "Credit Cards Stolen"
On June 13, 2014, P.F. Changs, based in Phoenix Arizona, released a statement saying they had experienced a breach involving data from their customers credit and debit cards used at their 403 location in the U.S. (including P.F. Changs and Pei Wei). he statement said the time frame in which credit card information was stolen was between March and May of 2014.
Read ArticleIT Engineer Damages Employer's Computers, Gets 4 Years in Prison
United States Attorney Booth Goodwin, announced recently that a former network engineer at Charleston, South Carolina based EnerVest Operating, LLC (“EnerVest”), was sentenced to four years in federal prison for intentionally causing significant damage to his employer’s computer system. The culprit: Ricky Joe Mitchell, 35, of Charleston, West Virginia.
Read ArticleWho is Watching You Online?
The world has watched in recent years as Twitter, Facebook and other social media sites have made political uprisings possible where previously very difficult or perhaps impossible. In countries where dissidents had trouble making their voices heard due to the inability to quickly connect with one another, these tools are used to forward their agendas and change history.
Read ArticleNosy Healthcare Employees Snoop Electronic Medical Records
Electronic Medical Records (EMR) and Electronic Health Records (EHR) are great tools that allow for data exchange between providers and faster access to a person’s medical history. Along with this ease of access comes the potential for abuse.
Read ArticleLaw Firms Must Step Up Cybersecurity
A recent article in the New York Times underscores the demand clients are requiring of their law firms to step up their cybersecurity. Financial institutions, including some Wall Street banks, are asking their outside counselors to answer questionnaires of up to 60 pages, which probe the firm’s cyber security measures. Other types of corporations are also asking their legal firms to allow for internal and/or external Information Technology (IT) firms to do an audit.
Read ArticleThe Heartbreak of the Heartbleed Bug: What You Need to Know
The Heartbleed bug is bad, very bad indeed. By one estimate, it affected nearly 2/3 of Internet sites at its discovery. The problem still exists today with sites that were not fixed. Here's what you need to know.
Read ArticleHealthcare Industry is Vulnerable to Cyber Attacks
An ID Experts study says that the increased use of smart phones and tablets is significantly increasing the risk of cyber attacks in the health care industry. It links the risk to these devices to not having proper malware and virus protection. The study also indicates that there has been a 100 percent increase in attacks in these types of organizations since 2010.
Read ArticleIn the Age of No Security & Privacy: Five Steps to More Security and Privacy
Security and privacy is important, and probably more important than what many realize. Recently it has become more obvious that security and privacy have been lacking, so here are a few, sometimes wacky, tips to ensure your continued safety and privacy from a variety of threats that can arise.
Read ArticleAttack on GoDaddy Highlights Importance of Employee Security Training
An employee of the website hosting and Internet domain registrar, GoDaddy was tricked into giving a Black hat hacker information that could allow the hacker to take over customer’s domain names. This incident further illustrates that employees can be the weakest link in an organizations security.
Read ArticleCalifornia Law Would Require "Destroy" Function in Cell Phones
A proposed California law would force Cellular Providers to have the ability to remotely destroy stolen cell phones. Once destroyed, the cell phone would be useless.
Read ArticleSample Employee Termination Checklist
In today's technology world, almost every company uses computers. Here's a sample of an Employee Termination Checklist.
Read ArticleSample Cell Phone Use While Driving Policy
Here is a sample Cell Phone Use While Driving policy.
Read ArticleFirm Clean Desk Policy
In today's technology world, almost every company uses computers, but there's still plenty of papers to sift through on your desk. Here's a sample of a Clean Desk policy which can be used in your organization.
Read ArticleHarvard's School of Law Weblogs - Terms of Service
In today's technology world, almost every company uses computers. Over the next few weeks, Evidence Solutions, Inc. will be delivering some sample policies which can be used in your organization. Our Holiday Gift to You.
Read ArticleSample Computer and Email Usage Policy
In today's technology world, almost every company uses computers. Here is a sample Computer and Email Usage Policy.
Read ArticleCollection of Electronic Evidence in Truck Accidents can be Key to Developing Your Case
Black Boxes on trucks including EDR, ECM, ECU, allow help determine what was happening with the vehicle during the time prior to the crash. Some of these devices can store years worth of data, others just store the condition of the Tractor during a recent event such as “Hard Stop” or crash.
Read ArticleWhy Deleted Data Might be Okay
The first spoliation case of its kind is almost a decade old…. But there are still lessons to be learned from it. The case is known as the "Arista Records, Inc. v. Sakfield Holding Co" case. While this case may not mean much to some, it is a well-known case in the digital forensics world because it brings up an interesting point: What happens when the data you are looking for is gone?
Read ArticlePersonal Privacy and Google Glass
There’s been a lot of hype in the media of Google’s (based in Mountain View, CA) new toy, Google Glass. A wearable computer that is controlled primarily by voice and eye movement, this rather distracting piece of eyewear has been touted as the new hot item that everyone wants.
Read ArticleYou Secured Your Computer and Your Phone, What About Your Car?
With new cars having extra features such as assisted parking and crash avoidance, they require more computers to control them. It is estimated that the average new car can have upwards of 50 microprocessors (computer brains) in it, that control everything from how much you brake to your air conditioning.
Read ArticleTheft of Intellectual Property is on the Rise
According to a recent survey, about 56% of employees admit to stealing Intellectual Property (IP) from their company when they are fired.
Read ArticleDeath and Digital Assets
It is inevitable, one day you will die. Modern science may someday cure this flaw in the human body, but for now we know that at some point, we will cease to be alive. This brings about a flurry of various costs and fees (dying can be expensive) and your possessions will be given to your next of kin. But what happens to your digital possessions?
Read ArticleRansomware Attempts to Extort Money
The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) and the Department of Homeland Security (DHS) have recently received complaints regarding a ransomware campaign using the name of the DHS to extort money from unsuspecting victims.
Read ArticleHowdy, I'm a Hacker!
Whenever you hear the term “hacker” what most often comes to mind? The most common visual is the pale nerd in his mother’s basement who is getting into his university server to change his rivals grades to failing ones. Then there are the various Hollywood depictions which show “master criminals” manipulating traffic signals and financial markets. This is a fairly recent use of the word “hacker” and for years before it had a very different meaning.
Read ArticleSocial Engineering: How You are the Hacker’s Greatest Tool, and What You Can do to Prevent It
Let’s define the term “Social Engineering”. Simply put, it is the art of manipulating people into doing something, like divulging confidential information or performing actions that would expose information, and making them feel good about doing it, i.e they “solved” a problem or helped someone, etc. This allows the hacker to obtain information in a non-threatening manner.
Read ArticleResearcher Demos Spy Phone
Since the dawn of the modern smart phone it has been apparent that they can be used to spy on someone. Reviewing cell phone GPS information can track the user’s movements. In addition, if you want to know who calls have been place to or received from a review of the phone’s call logs stores this information.
Read ArticleFacebook Exposes Personal Data
Facebook recently released a statement detailing how over 6 million of its 1.1 billion users had their personal information unduly exposed. The cause? A minor error in the software of one of its largest archives. This error inadvertently allowed unauthorized users to view confidential contact data (such as email addresses and phone numbers) without any need for a password.
Read ArticleTraveling? Treat Your Laptop like Cash!
In today’s society, traveling with a laptop seems like an everyday occurrence, whether for “mobile office” or just personal use. There are some things you should be aware of when traveling with your laptop. Since it is portable and portable items can be easily lost or stolen. Here are a few tips to help avoid heartache and an employer’s wrath.
Read ArticleHow to Keep Anyone From Snooping Around Your Cloud
In recent years government has increased its requests for access to Cloud data. Storage-As-A-Service providers such as Google Drive, Dropbox, iDrive, Microsoft Skydrive, Apple iCloud and others are receiving numerous requests to view what has been stored by various individuals and companies. In addition to the government, there are instances of the storage company’s employees exposing or taking data for their own or others use.
Read ArticleHow to have Safer Passwords: Rules 1-3
As part of our forensics practice, we sometimes have to break or “crack” passwords. Password cracking is much more difficult and can, perhaps, foil hackers when a few simple rules are followed. Here are some tips to help keep our client's data safe:
Read ArticleLaw Firm's Trust Account Hacked! Six Figures Taken!!!
A Toronto area law firm is missing six figures from their trust account. After being hit over the holidays by a virus which gave hackers remote backdoor access to the firm’s bookkeeper’s computer. The virus, known as the Trojan Banker Virus, was designed to capture keystrokes, which can include bank passwords, as they are typed.
Read ArticleTen Steps to Android Smartphone Security
Smartphones continue to grow in popularity and are now as powerful and functional as many computers. As mobile cybersecurity continues to grow, it is important to protect your smartphone just like you protect your computer. Mobile security tips can help you reduce the risk of exposure to mobile security threats.
Read ArticleTen Steps to Smartphone Security for iPhone
Smartphones continue to grow in popularity and are now as powerful and functional as many computers. As mobile cybersecurity continues to grow, it is important to protect your smartphone just like you protect your computer. Mobile security tips can help you reduce the risk of exposure to mobile security threats.
Read ArticleTen Steps to Smartphone Security for BlackBerry
Smartphones continue to grow in popularity and are now as powerful and functional as many computers. As mobile cybersecurity continues to grow, it is important to protect your smartphone just like you protect your computer. Mobile security tips can help you reduce the risk of exposure to mobile security threats.
Read ArticleHow to Find a GPS Tracker in Your Car… if You Can
There have been some interesting stories about how GPS tracking systems needed to “see the sky”. And there have been plenty of idiots who have simply placed the tracker on the roof of the car. In that case finding the tracker is simple. In more sophisticated and therefore challenging locating exercises, it can take several hours for mechanics to find the device, especially when they are mounted behind the dashboard.
Read ArticleU.S. Charges Eight in Hacking Scheme
Last week, the United States District Court of New Jersey filled charges against eight people, who allegedly hacked into many big name banks and stole upwards of $15,000,000.
Read ArticleManaging the Risky Business of Company E-mail - Part 2
In part one of this article we discussed how employees generally do not consider e-mail as it relates to the company’s legal standing. As an owner/supervisor, it is left to you to consider and take great care in educating your employees in what should or shouldn’t be put in writing. In addition, it is also up to you to make your employees aware how the written word is conveyed when read.
Read ArticleManaging the Risky Business of Company E-mail Part 1
As an employer, Human Resources Director, or Risk Management Supervisor, ask yourself this question: “Do our employees think about the legal risk of sending communications over the internet?” If you are like the majority of companies, your answer would be, “It is highly improbable”. It is a very common problem amid the work place, for an employee to believe their electronic communications are transient, temporary and, once deleted, untraceable and therefore, harmless.
Read Article