Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Passware Kit 12.1: Accelerated Password Recovery for MS Office 2013, PGP, more

Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery software for computer forensics, law enforcement organizations, government agencies and private investigators, announces that Passware Kit Forensic v.12.1 can recover passwords for files from the newly released MS

CTIN Digital Forensics Conference March 13-15, 2013

www.ctinconference.org : $350 for 3 days of training and education in digital forensics. Speakers include experts and published authors in the field of digital forensics and cybersecurity. Topics include; Mobile Device Forensics, Internet Forensics, Physical Memory Analysis, Open Source Tools,

Paraben’s GPS & Tower Analysis Class Electronic Training Course

Paraben has released an electronic training course for the analysis of GPS data and cell tower records. The course includes three DVDs of video training and practical examinations. Once the courses are completed the students will be able to:* Demonstrate

BlackBag Technologies Announces Online iOS Device Seizure and Analysis Training

BlackBag Technologies, Inc., a leading developer of forensics software, training, and eDiscovery solutions, today announced a new online iOS Device Seizure and Analysis training course. This in-depth eLearning course teaches forensic examiners how to protect, acquire, and analyze data on

IEF Recommended In NIJ Electronic Crime Technology Center Of Excellence Report

Magnet Forensics’ INTERNET EVIDENCE FINDER (IEF) has been recommended in a report published by the NIJ Electronic Crime Technology Center of Excellence. The report provides a review of the software, walking through IEF’s special features, and includes detailed results of

XRY v6.4.1 launched

Micro Systemation (MSAB) have just updated their mobile forensics software, XRY. The latest version 6.4.1 now offers support for 8,108 mobile device profiles and includes a dozen new features for existing customers with a current license. Included in the release

Interview with Eddie Sheehy, CEO, Nuix

Eddie, can you tell us something about your background and your current role as CEO of Nuix? I joined Nuix as CEO in 2006 after working for quite a few high-growth finance and technology businesses. What I loved about Nuix

Eddie Sheehy, CEO, Nuix

Eddie, can you tell us something about your background and your current role as CEO of Nuix? I joined Nuix as CEO in 2006 after working for quite a few high-growth finance and technology businesses. What I loved about Nuix

BlackBag Technologies Announces MiCFE Mac Forensics Certification

BlackBag Technologies, Inc., a leading developer of forensics software, training, and eDiscovery solutions, today announced a new Mac and iOS Certified Forensic Examiner (MiCFE) program. This first-of-its-kind certification program is designed to validate expert-level Mac OS X, iPhone, iPad, and

Unacceptable Acceptable Use Policy

I had an opportunity this week to be on the receiving end of an acceptable use policy (AUP) – something that I should experience each and every time I work for a new client on their hardware, but something that

Casey Anthony detectives overlooked searches for suffocation methods

The Florida sheriff’s office that investigated Caylee Anthony’s death confirmed Sunday that it overlooked a computer search for suffocation methods made from the little girl’s home on the day she was last seen alive. Orange County sheriff’s Capt. Angelo Nieves

How to report a computer crime: SQL injection website attack

In this article, we’ll look at an SQL injection attack. We’ll look at what offences are committed in different countries when a crime like this happens, how you should report the crime, and what evidence you can preserve. Take this