Digital Forensics Jobs Round-Up, August 04 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Alabama AG wants expanded role for Troy forensics lab

Alabama Attorney General Troy King wants to expand the crimefighting work being done at the Troy University Computer Forensics Lab to include more training for local law enforcement regarding electronic evidence… More (Dothan Eagle)

Northrop Grumman Launches Cybersecurity Research Group

Government security contractor Northrop Grumman has joined with three leading cybersecurity research universities to launch a research consortium focused on fixing the most vexing problems in information security…The consortium will work on a number of projects, including dependable software analysis,

Scottish University course to beat computer crime

A new generation of forensic computer specialists is being trained at a Scots university…The MSc in Advanced Security and Digital Forensics will teach recruits how to track down hi-tech criminals… More (Scotsman)

Top Experts Examine Causes Of Breaches In Spy Museum Forensics Panel

“Digital forensics is much harder than crime forensics…When there’s a murder, there’s a body. There’s evidence everywhere. In digital forensics, there’s no body. You might not even know there has been a murder until months after it happened”… More (Dark

Chicago lab goes after digital crooks

Trying to conceal wrongdoing, criminals often do whatever possible to get rid of digital evidence, sometimes acting in a moment of panic. That can include anything from deleting e-mails to shooting computers with a shotgun or even burning the house

Future cyber sleuths get an early start

A threat in an online game chat room didn’t faze Alexis Rivera…had the cyber boys known whom they were targeting, they might have changed their minds. Rivera intends to pursue a digital forensics career with the FBI. She is one

Passware Software Cracks BitLocker Encryption Open

Passware Inc., a provider of password recovery, decryption, and evidence discovery software for computer forensics, has created the first commercially available software to break Microsoft BitLocker hard drive encryption. The new version of its flagship product – Passware Kit Forensic

4 Cheap Options to Monitor Networks for Evidence

Computer forensics don’t have to solely focus on recovering and searching for evidence on storage devices. Although programs like Encase and FTK 3.0 are excellent tools to help find documents, photographs and other files for your investigation, they cut short

MS unleashes legal attack dogs to lick up COFEE spill

Microsoft unleashed its legal attack dogs to remove its leaked forensics tool from a respected security site, it has emerged. Cryptome.org was issued with a take-down notice shortly after Microsoft’s point-and-click “computer forensics for cops” tool leaked onto the web

Computer forensics backlog risk

A build-up of seized technology waiting for forensic examination could pose a serious risk to ongoing investigations, the Association of Chief Police Officers (ACPO) lead on e-crime has warned. In an interview with The Register, Deputy Assistant Commissioner Janet Williams

Network Forensics and Digital Time Travel

Capturing, storing and analyzing network traffic using network forensics can let administrators turn back the clock to perform post-attack analysis for security exploits. Beyond security, there are other day-to-day use cases for network forensics… More (TechNewsWorld)

Age of cyber warfare is ‘dawning’

Chris Wysopal, chief technology officer at Veracode which advises many governments on security, said cyber war presented its own problems when it came to deciding motive and finding the perpetrators. “In physical warfare it’s pretty clear who has which weapon

His Facebook Status Now? ‘Charges Dropped’

Where’s my pancakes, read Rodney Bradford’s Facebook page, in a message typed on Saturday, Oct. 17, at 11:49 a.m., from a computer in his father’s apartment in Harlem. At the time, the sentence, written in indecipherable street slang, was just

Computer Forensics in the Geek Press – A Taxonomy

"So COFEE has finally been leaked onto the Internet. It was inevitable and it’s a wonder that it wasn’t released sooner, but nevertheless it marks a sad day for the Law Enforcement computer forensics community…So why the long face, as

Third Vere Software Online Investigation Basic Webinar

On Thursday, November 12, starting at 11 a.m. Pacific time, Corona (California) Detective Frank Zellers will present this 60-minute webinar designed to show corporate and law enforcement investigators how to obtain evidence and information from social networking sites. The “MySpace

Academic institutions – who are we missing?

As many of you know I’ve recently made a start on building the new education section at Forensic Focus (hopefully bringing it online later this month) with the aim of listing every computer forensics university and college course worldwide. I’d