Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Parallels hard drive image converting for analysis

The other day, talking to one of the analysts in Dallas, a question emerged about analyzing Parallels’ virtual machine hard drives. To my surprise, I did not find many help on this issue on-line and did not find tools that

Retrieving Digital Evidence: Methods, Techniques and Issues

by Yuri Gubanov yug@belkasoft.com Belkasoft Ltd. http://belkasoft.com Abstract This article describes the various types of digital forensic evidence available on users’ PC and laptop computers, and discusses methods of retrieving such evidence. Download article in PDF format Introduction A recent 

A Quick Look at Exchange Forensics

A growing number of enterprises—and their IT staffs—are becoming increasingly concerned about the range of threats posed by electronic attack. Couple that with the high incidence of business litigation, and the high regulatory barriers, present in the US and EU,

Computer crime given low priority by Irish firms

Irish firms are failing to treat the threat of computer crime as seriously as they should, a new survey has revealed, with a lack of funding in information security and insufficient employee awareness of threats identified. According to the survey

Belkasoft releases Evidence Center v4.1 featuring deeper EnCase integration

Belkasoft releases Belkasoft Evidence Center 2012 version 4.1 featuring deeper EnCase v7 integration and more than 210 supported artifact types. The company’s flagship forensic tool, Belkasoft Evidence Center, now supports new EnCase v7 EX01 evidence files as well as E01,

Interview with John H. Riley, Bloomsburg University of Pennsylvania

John, can you tell us something about your background and why you decided to teach digital forensics? First, thanks for the opportunity to discuss our program. We’re really proud of what we’ve accomplished here and believe we’re contributing to the

Parallels hard drive image converting for analysis

Abstract The other day, talking to one of the analysts in Dallas, a question emerged about analyzing Parallels’ virtual machine hard drives.  To my surprise, I did not find many help on this issue on-line and did not find tools

John H. Riley, Bloomsburg University of Pennsylvania

John, can you tell us something about your background and why you decided to teach digital forensics? First, thanks for the opportunity to discuss our program. We’re really proud of what we’ve accomplished here and believe we’re contributing to the

Digital Forensics is not just HOW but WHY

This paper will focus on the proper understanding of Digital Forensics from the educational point-of-view and explain the problem with certification based skill validation to establish “expert” skills since Digital Forensic education did not really existed up to just a

An Introduction to Penetration Testing – Part 1

In an earlier article, many moons ago, I stated my opinion that Forensics and Security were opposite sides of the same coin. I’ve felt very strongly that my skills as a Security Consultant have only been strengthened and expanded by

Internet Evidence Finder (IEF) v5.5 First to Support IE 10 and Cloud Apps

With a strong commitment to helping thousands of its customers in law enforcement, military, government and corporate organizations retrieve Internet evidence from the broadest range of artifacts, JADsoftware has unveiled v5.5 of its industry leading data recovery software, Internet Evidence

Computer forensics training in Prague

In this Help Net Security interview, Gareth Dance, Conference Director, EMEA, SANS Institute, talks about SANS Forensics Prague 2012. SANS Forensics Prague 2012 is a technically intense event. What can attendees expect? What type of existing knowledge is necessary in

An Introduction to Penetration Testing – Part 1

In an earlier article, many moons ago (Sorry Jamie !), I stated my opinion that Forensics and Security were opposite sides of the same coin. I’ve felt very strongly that my skills as a Security Consultant have only been strengthened