The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Guidance Software Brings Digital Forensics to Apple iPad, iPhone 4

Guidance Software, Inc. today announced a new forensic tool for the Apple iPad, iPhone 4 and iPod touch, giving digital investigators the ability to perform forensic analysis and e-discovery on the tablet that one in five Americans plan to buy

SAFE Corporation announces CodeSuite-LT

Software Analysis & Forensic Engineering Corporation (www.SAFE-corp.biz) has announced the release of CodeSuite-LT(R), a “lite” version of CodeSuite offering all of the key functionality for unlimited use over the term of the license.”These days companies are understandably much more cost

Evaluating Mobile Telephone Connection Behaviour – Part 1

by Sam Raincock "In general, all modern mobile telephones contain call information and SMS message storage which may be used as evidence. There may also be a wealth of other evidence available including browser history, sat nav usage etc. However,

Cyberwar? What Cyberwar?

Cyberwar hype is inhibiting government attempts to develop an appropriate response to cybersecurity threats, say computer scientists. A heavyweight study by UK computer scientists for the Organisation for Economic Cooperation and Development (OECD) concludes that it is “highly unlikely” there

Backbone Announces High Speed Real-Time Steganography Detection System

Backbone Security has announced the availability of a 1Gbps version of their network security appliance for detecting insider use of digital steganography to steal sensitive information. The Steganography Analyzer Real-time Scanner, StegAlyzerRTS, developed in Backbone’s Steganography Analysis and Research Center

So you want to be a computer forensics expert

A forensic pathologist is a medical doctor first, who then specializes in pathology, with forensics being a subspecialty. Similarly, a forensic accountant has a broad education in general accounting principles before focusing on the legal field. Ideally, then, a computer

Security Researcher, CyberCrime Foe Goes Missing

A well-known security researcher and cybercrime foe appears to have gone missing in Bulgaria and is feared harmed, according to a news organization that hosts a blog the researcher co-writes. Bulgarian researcher Dancho Danchev, who writes for ZDNet’s Zero Day

OMG! Cops Can Read R Texts

Think again before texting about that drug deal you just made, because police will be able to read all about it if you get arrested. And they won’t need a warrant. The California Supreme Court ruled in San Francisco Monday

Facebook used in hunt for Jo Yeates’ killer

Detectives have begun a Facebook campaign in a bid to catch the killer of Jo Yeates. Her body was found on Christmas Day, in Longwood Lane, Failand, eight days after she was reported missing from her home in Clifton, Bristol.

Hackers crack open mobile network

Mobile calls and texts made on any GSM network can be eavesdropped upon using four cheap phones and open source software, say security researchers. Karsten Nohl and Sylvain Munaut demonstrated their eavesdropping toolkit at the Chaos Computer Club Congress (CCC)

American charged with hacking after snooping on wife’s emails

A Michigan man has been charged under anti-hacking legislation designed to protect trade secrets after logging on to his wife’s email account and discovering she was having an affair. Leon Walker, 33, faces a trial lawyers say could have significant

Merry Christmas to all members!

Merry Christmas everyone! Hope you’re all having a good time and enjoying a well deserved rest! Best wishes, Jamie

Resurrecting Deadbeats

by Craig Ball "An op-ed piece in the New York Times called Begging for Your Pay describes the humiliating ordeal of freelancers forced to hound clients to recover thousands of dollars of compensation. It brings to mind the occasional posts

Pre-Emptive Digital Forensics Research

by Chris Hargreaves "In August 2010 it was announced that Google Wave would not be continuing as a stand-alone product, having been available to the general public for just 2-3 months. In that time period, it is unlikely that much