Data Forensics Blog - Professional Forensic Data Recovery
Sexist gender roles can be a 'recipe' for coercive relationship - 14 March 2016 »
With one call every minute about relationship abuse to the police, spotting the signs - either as a victim or outsider - is becoming increasingly important.
Court rules domestic violence legal aid time limit is invalid - 09 March 2016 »
A controversial impact of the 2012 Legal Aid, Sentencing and Punishment of Offenders Act (LASPO) was for clients to obtain Legal Aid for a family matter they were required to provide evidence of domestic violence within the last 24 months.
Have You Been Targeted By A Troll? - 03 March 2016 »
Trolls who post damaging material online using fake profiles in the name of their victims can be charged under new advice for prosecutors.
Andrea Byrne cyber security and my digital journey of discovery - 02 March 2016 »
We all like to think of ourselves as security conscious. We leave the house and we check the windows and doors are locked
Change in legislation recognises control is at the centre of domestic abuse - 26 February 2016 »
From 29 December, ‘controlling or coercive behaviour in an intimate or family relationship’ will become illegal.
How technology is fuelling Britains hidden domestic abuse epidemic - 16 February 2016 »
If you need evidence to support your case call us we can help.
iPhone 6 handsets is rendering the devices useless if it detects repairs - 12 February 2016 »
The latest software update for iPhone 6 handsets is rendering the devices useless if it detects repairs not carried out by Apple.
GPS Forensics, Where has your partner been? - 02 February 2016 »
Do you need to check up on a partner? are they acting suspiciously? Infidelity is one of the major causes of break ups in relationships. If you suspect a partner the not knowing can be equally damaging.
Revenge Porn Ruins Lives - 21 January 2016 »
We’ve warned you to be careful about what you post online. But what happens when someone else shares an online post about you?
Chip-Off and JTAG Analysis - 14 January 2016 »
In the field of mobile-device forensics, the practices of “chip-off” and “JTAG” analysis have become topics of growing interest among the community.