This article was inspired by an active discussion in one of the forensic listservs. Original post was asking on how to fight with an argument “This is not me, this is a malware”.
The suspect was allegedly downloading and viewing illicit child ...
Read more