Investigating computer crimes

Thursday, 27 May 2004, 1:07 PM EST

Defense lawyers have right to collect information according to newly accepted Criminal Codes in some CIS countries. Defense attorney may independently view and take pictures of the crime scene or separate objects, to make a plan, a scheme of the area. These results may be used as grounds to apply for examination of other investigative (forensic) procedures. They favour better preparations to participation in these activities. Photos and schemes increase cogency of the application.

At the same time, defense lawyer cannot refer to data obtained or facts revealed during examination conducted by him as they do not have evidential significance.

By Natalya Akhtyrskaya at Computer Crime Research Center.

[ Read more ]




Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //