toll free: 888.220.3101
Hot Legal Issues. High-Tech Solutions.

Blog Archives

How to Turn Digital Video into a Star Witness

We live in a world in which video surveillance is omnipresent. Nowadays, we hardly bat an eye at finding ourselves reflected in a closed-circuit television (CCTV) screen in a supermarket, or realizing a friend took a video from last week’s brunch and posted it to social media. Video security footage, as well as footage from casual observers, exists in nearly every dimension of society, from law enforcement to the office to the privacy of our own home webcams. When it …

Capsicum Went to Rio by Way of a Telehealth App

If you’re like us, your free time these past few weeks has been spent watching the 2016 Olympics. We never fail to be incredibly impressed by the precision, speed, strength, agility and overall prowess on display by the world’s top athletes. But as we became acutely aware after working with one recent client, the Olympics aren’t just about great athletics. Great medicine, too, plays a significant role in the Olympics, an event that continues to drive medical innovation. Just as …

Summertime Security Tips

As the weather heats up, the kids switch from school to summer camp, and the adults look forward to some well-deserved beach/lake/pool time. Unfortunately hackers don’t take vacation and they may actually have more time on their hands to wreak havoc – so we have some quick summertime security tips to protect your workplace and family from cybercrime: When you’re out of the office on vacation, and using a webcam to monitor your home – make sure you register it, …

Think You Can Get Away Without a Code Review? Think Again.

When discussing security options with our clients, we frequently hear them dismiss code review as an unnecessary extra. However, that perception couldn’t be further from the truth. Code review, a process in which software code is inspected for vulnerabilities before, during and after its implementation, is a necessary part of any cybersecurity strategy, especially if your company is about to implement a new program.   Although code writers are often brilliant scientists and artists, they may not be security specialists, …

Cell Phone Encryption – What’s Your Call?

When you read a letter or post that starts… “A Message to Our Customers – This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake” – as does the letter Apple’s CEO Tim Cook recently released urging consumer involvement in the discussion regarding privacy right – do you read on or move on? Capsicum Group urges you to read on, be informed, and render your opinion regarding this …

New Year, Same White Collar Fears

It’s that special time of year again! As we turn the page on the calendar from December 2015 to January 2016, New Years’ resolutions are made, encouraging us to act with good will towards humankind, to live life ethically. Sadly, however, just because this time of year warrants promises to be the best we can be, doesn’t mean that the world gets a reprieve from greed and deception. The calls that Capsicum Group has answered to investigate cases of white …

From Berwyn to the Big City: Capsicum Celebrates 15 Years!

The month of September is an exciting time for Capsicum Group. We have been proudly serving both national and international clients for 15 years! Founded as a subsidiary of Pepper Hamilton, our roots took hold in the Berwyn, Pennsylvania area – but we quickly saw the need to expand and became an independent firm relocating to the Big City of Philadelphia. Ever since 2006, we have maintained an office at the Cira Centre adjacent to the iconic 30th Street Station …

A Robot’s Demise Raises Serious Questions

After charming locals in Canada, Germany and the Netherlands, the traveling robot known as hitchBOT made an ill-fated trip across the United States earlier this month. It was welcomed warmly in Salem, Massachusetts, and San Francisco, but the journey came to an abrupt halt in none other than Philadelphia, the City of Brotherly Love, where persons unknown (maybe frightened by the robot, or just annoyed that it was in their way) destroyed and decapitated hitchBOT early in the morning of …

The Future of Intrusion Detection

In 2013, networks had to contend with 80 million malware threats. In 2014, the number of new threats rose to 140 million. Furthermore, as recent attacks by hacker organizations Equation Group and Carbanak demonstrate, the new influx of malware is as undetectable as ever. Clearly, the proliferation of cyber threats shows no sign of abating, and strongholds of sensitive data must contend with them. Given the exponential growth of intelligent malware, this is a difficult task, but not impossible. The …

Capsicum Group, LLC Welcomes Bill Smead, Pam King and Maritza Chang

Capsicum Group is proud to announce the recent hire of Senior Consultants Bill Smead, Pam King and Maritza Chang. The addition of Smead, King and Chang to the team propels Capsicum Group, LLC further towards the cutting edge of solving high-tech issues for its clients.  Properly presented digital evidence is irrefutable, and in some cases, digital evidence may be the only existing evidence. Capsicum’s computer forensics team is experienced in all areas of digital forensics and investigations, and has recovered …