Legal Career Center
Preparing for the mobile data revolution
Originally posted on Forensic Diaries: A Fraud Investigation & Dispute Services Blog:
Every parameter is pointing toward mobile phones replacing bank branches, ATM cards and much more. But are telecom companies ready to take the consumer onslaught and ensure safe transactions? The global telecommunications (telecom) industry has witnessed several changes. The noteworthy ones include infrastructure…
Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0
Originally posted on Forensic Focus - Articles:
by Oleg Skulkin & Igor Shorokhov The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions with users’ data, their bootloaders are locked and classic custom recovery acquisition, which is widely used especially for Samsung smartphones,…
How the Hacker Way Guided Me to e-Discovery, then AI Ethics
Originally posted on e-Discovery Team ®:
This new ten minute video on Hacker Way and Legal Practice Management was added to my Hacker Way and AI-Ethics pages this week. It explains how one led to another. It also provides more insight into why I think the major problems of e-discovery have now been solved, with a…
E-DISCOVERY IS OVER: The big problems of e-discovery have now all been solved. Crises Averted. The Law now has bigger fish to fry.
Originally posted on e-Discovery Team ®:
Congratulations! We did it. We survived the technology tsunami. The time of great danger to Law and Justice from  e-Discovery challenges is now over. Whew! A toast of congratulations to one and all. From here on it is just a matter of tweaking the principles and procedures that we have…
Countering emerging cyber threats in the banking sector
Originally posted on Forensic Diaries: A Fraud Investigation & Dispute Services Blog:
The threat of cybercrime on the global banking and financial services industry is apparent with a tectonic increase in cases over the past few years. These attacks have become highly targeted, and cyber criminals seem to have hit the jackpot by deploying sophisticated…

rssfeedwidget.com