Archives
Author Archive
for: ‘’

E-discovery vs. forensics: Analyzing digital evidence

Digital evidence continues to be a growing focus of the legal community. In a very real way, digital evidence and its utilization in court can be compared to the advances in the use of DNA science that our courts saw in the last century. In a ubiquitously digital world, digital evidence has applications in almost […]

Read More

Managing Cyber Risk: Is cyber liability insurance important for law firms?

Cyber liability insurance policies are growing in popularity among organizations that store client data, but in my experience those who have them are probably just as confused about what they cover as those who decide to go without. Generally described, cyber liability insurance is meant to protect businesses and organizations from cybersecurity risks posed by […]

Read More

Social engineering: How cybercriminals capitalize on urgency

Making a request seem urgent clouds the fact that the request violates protocol or the norm.  I was recently approached by a concerned person who wanted me to scrutinize an email received a few days prior. “Does this look like a phishing email? I don’t see any grammatical errors. But it’s asking me to visit this […]

Read More

Stephen Allwine: When crime tries to cover its digital tracks

In late 2016, I was approached by the Washington County (MN) Attorney’s Office to conduct forensic analysis on a number of devices in a homicide investigation. It soon became clear that the case would be one of the most interesting of my career, involving murder-for-hire, religious convictions, insurance money, infidelity, and a distinctly modern element—the […]

Read More

Is the Internet of Things spying on you?

So is your phone spying on you? Yes, it’s possible. A few months ago, Computer Forensic Services analyst Sean Lanterman spoke to KARE 11 News about a topic that makes a lot of people nervous. “Is my phone spying on me?” may have seemed like a paranoid question at one point, but it now seems like […]

Read More

#UberFail

The recent headlines about Uber’s 2016 data breach describe yet another cyber event that left millions compromised and rightfully angry. But yet again, people by and large are not angry that the breach happened, or even necessarily about the large size of the breach, which involved approximately 57 million Uber riders and drivers. Mostly, people […]

Read More

Ransomware: To pay or not to pay?

“No matter what you do, you might become a victim. Yet there are very manageable and reasonable ways to prepare yourself for the possibility that it will happen to you or your organization.” I got a great question from a concerned audience member at a recent speaking event: “If I am a victim of ransomware, should I pay […]

Read More

How digital evidence supported gerrymandering claims

Earlier this month, I had the once-in-a-lifetime opportunity to travel to the United States Supreme Court to witness the headline-making gerrymandering oral arguments out of Wisconsin. Some people are calling this case the most important of the year, with enormous potential consequences for political redistricting and any number of similar cases in which gerrymandering claims […]

Read More

Facial recognition technology brings security & privacy concerns

In recent years, facial recognition technology has had some great successes. They include recognizing the faces involved in terroristic attacks, scanning faces at the airport for identification instead of using a passport, and—now—becoming a feature of our digital devices. It’s clear that new applications of this technology are being utilized to streamline and simplify. Facial […]

Read More

Putting communication and clients first in digital forensic analysis

Within the software development community, production methodologies are adjusting rapidly to account for an increase in active consumer participation and involvement. The status quo is no longer suitable when consumers have specific demands regarding what their software must be able to do for them. Software engineers are no longer able to simply guess what their […]

Read More
Page 1 of 212»

Articles by Issue

Articles by Subject