Did you know that by surfing the internet you can lose your privacy, your money and even your identity? Computer viruses and Trojans often arise during the investigation of computer-based crime, such as the downloading of child pornography. But what if you are innocent? Often Trojans are cited as th…
How feasible is 'The Trojan Defence', or is it just an convenient excuse for someone trying to dodge guilt
Transcript -- How feasible is 'The Trojan Defence', or is it just an convenient excuse for someone trying to dodge guilt
Ian Kennedy takes us further into the dark underground world of computer malware and reveals the products and business models used to fund a 'hidden' economy.
Transcript -- Ian Kennedy takes us further into the dark underground world of computer malware and reveals the products and business models used to fund a 'hidden' economy.
How the Trojan Defence works as a legal defence, and the challenges computer crime raises for both prosecution and for defence.
Transcript -- How the Trojan Defence works as a legal defence, and the challenges computer crime raises for both prosecution and for defence.
Ian Kennedy walks through an investigation that he conducted on a computer containing indecent images of children, leaving the audience to decide the what the verdict should be: guilty or not guilty.
Transcript -- Ian Kennedy walks through an investigation that he conducted on a computer containing indecent images of children, leaving the audience to decide the what the verdict should be: guilty or not guilty.