Computer Privacy Vulnerabilities

Hackable Keyboards and Mice

You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These vulnerabilities could allow hackers to eavesdrop on your keystrokes and expose your sensitive data including credit card and banking information, social security number and passwords.…

The Learning Curve of Digital Evidence

[impact_text include_button=”yes” title=”Yes, Digital Evidence can help my case!” href=”http://www.hawkpi.com/contact/” color=”orange” size=”large” type=”outerglow” target=”_self” position=”cta_align_bottom” border_top=”no” border_bottom=”no” width=”1/1″ el_position=”first last”] What does this mean for you? It means the evidence you need to win your case and learn the truth is easier to access than ever before. [/impact_text]

Case Study: Catfishing

Catfish /’kat, fiSH/ – to lure someone into a relationship by means of an online fictional persona. Words with new meanings are popping up all over the place. For example, the word catfish is also a verb used in connection with an online profile that stretches the truth or is fictitious. However for most people,…