Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

ReclaiMe Introduces BTRFS Recovery

ReclaiMe – the only data recovery vendor providing BTRFS recovery BTRFS is a filesystem from Linux which has several distinctive features such as copy-on-write, checksumming, data scrubbing, and more. ReclaiMe Data Recovery Company integrated a new data recovery algorithm using

Webinar: Policing the digital crimes of today

Date/Time: Tuesday 5th May, 4pm BST/11am EDT Speakers: Paul Slater, Director of Forensic Solutions EMEA at Nuix and Troy Bettencourt, Sales Engineer NA at Nuix Investigators who are working with legacy digital forensic tools and faced with shrinking budgets often

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums. How would you acquire data from a password protected MS Surface Pro? Forum members discuss malware risk mitigation on forensic workstations. How can a split E01 image of

Head replacement tools for “landing zone” HDDs

Very important part of HDD functioning is a principle of heads parking while device is turned off. During the decades of HDD development, numerous improvements in this area were seen. These changes positively affected data security, capacity, product lifetime and

Taking Down Fraud Sites is Whac-a-Mole

I’ve been doing quite a bit of public speaking lately — usually about cybercrime and underground activity — and there’s one question that nearly always comes from the audience: “Why are these fraud Web sites allowed to operate, and not

Expert-Level (ISC)2 CCFP Digital Forensics Training Available from May-July

From May 11-July 1, 2015, (ISC)2 is delivering Live OnLine Training courses to provide expert-level instruction for those interested in attaining CCFP certification (Certified Cyber Forensics Professional). The courses are delivered through the (ISC)2 Learning Center, a centralized platform that

Interview with Matt Davies, Digital Forensics Analyst, Sytech

Matt, you're a digital forensics analyst at Sytech. Tell us a bit about your role and what it involves. My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems,

Matt Davies, Digital Forensics Analyst, Sytech

Matt, you're a digital forensics analyst at Sytech. Tell us a bit about your role and what it involves. My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems,

Review: Mobile Phone Examiner Plus (MPE+) – Part 2

Reviewed by Si Biles, Thinking Security One of the things that I love about being in IT is that it is an ever changing field. I find myself coming across new things daily. This even occasionally applies to my own

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics

By Jared Stern Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.” Sometimes, a person’s voice is the only clue that police and

International Police Operation Targets Polymorphic Beebone Botnet

On 8 April, Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT), joined forces with the Dutch authorities and the FBI, and U.S-based representatives at the National Cyber Investigative Joint Task Force- International Cyber Crime Coordination Cell

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics

By Jared Stern Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.” Sometimes, a person’s voice is the only clue that police and