My interview with IT Pro on methods by which cyber criminals fail to sometimes cover their tracks.