Digital Forensics Expert Beth Messick

Hawk PI Enhances Digital Forensics Capabilities

Hawk PI Enhances Digital Forensics Capabilities with the Addition of Nationally-Recognized Expert Beth MessickATLANTA (Mar. 10, 2020) Hawk PI, a leader in digital and technical investigative techniques, announces the addition of retired GBI digital forensics expert, Beth Messick. In this role, she will provide advisory services to attorneys and businesses in the digital forensics aspects…

The Streak Continues: Hawk PI Voted Best Investigative Firm for Five Years

ATLANTA (May 6 , 2019) – Hawk Professional Investigations was voted Georgia’s #1 investigative firm for a record-setting fifth consecutive year, winning the Daily Report’s BEST OF award for 2019. Winners are determined by voting among Georgia’s legal community. Hawk PI previously won the award in 2015, 2016, 2017 and 2018, and was named to…

TSCM Bug Sweep Expert

HPI’s Tim Keener to speak at Georgia Private Investigators Conference

ATLANTA (Apr. 26, 2019) – Tim Keener, U.S. Secret Service (Retired) and Director of Global TSCM & Physical Security for Hawk PI, will present a seminar on Debugging & Detection in Today’s Technological Environment at the Georgia Association of Professional Private Investigators Spring Training Conference. The event, held April 25-26, offers continuing education opportunities for…

Apple’s FaceTime Bug is Just the Tip of the Iceberg

While Apple’s newly discovered FaceTime bug grabs global headlines, experts warn that all mobile devices are vulnerable to privacy exploits.  The vulnerability in FaceTime, discovered by a 14-year-old Fortnite player in Arizona, allows a caller to eavesdrop – and in some cases view live video – of the person being called, even before the recipient…

Computer Privacy Vulnerabilities

Hackable Keyboards and Mice

You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These vulnerabilities could allow hackers to eavesdrop on your keystrokes and expose your sensitive data including credit card and banking information, social security number and passwords.…

Case Study: Catfishing

Catfish /’kat, fiSH/ – to lure someone into a relationship by means of an online fictional persona. Words with new meanings are popping up all over the place. For example, the word catfish is also a verb used in connection with an online profile that stretches the truth or is fictitious. However for most people,…