Is Hacking an Instagram Account Always a Crime in Florida? A guy in Florida was convicted of unauthorized computer use. the court reversed his conviction. The guy“logged into his ex-girlfriend’s Instagram account and posted nude photographs of her without her permission.” The prosecutor claimed that constituted a violation of section 815.06(1)(a), Florida Statutes (2013). What…
Continue reading ›Articles Posted in Computers
What Happens When Police Search Your Lost Cell Phone That Has Illegal Material On It? The story begins in a Walmart in Florida. The owner lost their phone at Walmart. After he left the phone, it was found, and the owner agreed to pick it up from the store. The owner of the phone failed…
Continue reading ›Cybercrime: A Lucrative and Dangerous Underground World The underground world of cybercrime is thriving, with millions of stolen credit card numbers and personal identification details available for mere dollars. This report delves into the activities of digital mobsters who specialize in phishing expeditions, sending millions of scam emails daily. These cybercriminals remain hidden behind digital…
Continue reading ›We are inundated with technologies designed to more effectively communicate. Some have caused users to defectively communicate. Misuse yields communications breakdown or even worse – death by PowerPoint®. With 400 Million Copies of Microsoft Office® and millions of PowerPoint® Presentations every day, one commentator, Dave Paradi surveyed and found several annoying elements in the bane…
Continue reading ›As the use of commercial broadband cable modem’s flourishes, the opportunity for computer criminals or hackers to attack computers attached to these networks similarly has skyrocketed. Unbeknownst to most users, a cable modem provides easy access to an attached computer. Protection of these computers is a three-stage process. A first line of defense against malicious…
Continue reading ›There are secret messages in your documents that are not secret. Both major word processing packages, Word and Word Perfect, contain hidden information that unless carefully removed can be a rich source of information to an opponent to whom the document is digitally distributed. Documents contain far more information than can be seen on screen.…
Continue reading ›Phishing Phishing is not to be confused with ‘fishing.’ There is no cast net, no baiting of the hook, and no minnow awaiting a large-mouth bass. But there are plenty of wireless fly rods out there. What do I mean? Specifically, an enterprising nerd or computer wizard of the binary-off generation can send you a…
Continue reading ›For a decade or so marketing hype has promoted the paperless office. Courts have begun to accept and in some instances require filings to be digital, on diskette, and/or on paper. According to a recent study 41 states now allow digital copies of documents into evidence. Late in 2002, the Supreme Court of Florida ordered…
Continue reading ›Last year we published an article on securing a cable modem. In the few months since that article, new threats to computer security have arisen. Previously a hardware and/or software firewall coupled with anti-virus protection was sufficient. New threats have arisen from programs that are installed by mere visits to web pages. Recommendations for securing…
Continue reading ›Electronic fingerprints remain available for review if you know what to look for. The skeletal remains of files deleted or history of persons and places visited are seemingly hidden in the world behind the computer’s display. A plan to recover this information by a team with computer forensic expertise can be a powerful tool for…
Continue reading ›