Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Hero Image

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Transforming Mental Health And Organisational Culture In Digital Forensics

Transforming Mental Health And Organisational Culture In Digital Forensics

Discover how Adapt & Evolve is helping transform digital forensic units through trauma-informed, evidence-based workshops on stress, psychological safety, and leadership....read more

EnCase Portable Wins Cygnus Law Enforcement Group Award in Forensics Category

EnCase Portable has been selected by an independent judges panel of law enforcement professionals for the Forensics award in Cygnus Law Enforcement Group`s 2009 Innovation Awards. The panel evaluated products submitted for innovativeness, productivity, quality, contribution, ease of use and

Tiffany Gates (ManTech) On the Importance of Cyber Forensics

What is cyber forensics and how does it factor in to cyber defense? "Cyber Forensics is the art and science of extracting data from digital media whereas cyber defense uses cyber forensics to identify threats and respond to incidents. However,

A Tool For Investigating Suspicious Activity

With the hit-or-miss performance of antivirus solutions and craftiness of malware authors, determining whether a computer system is infected is getting harder. As a result of the above conundrum, I’ve been looking for some way to get more details about

SC Suite v3.8 Released.

A new version of SC Suite is available, version 3.8 now includes more tools to analyse and extract information from a variety of file types and utilities to assist in every day tasks. Continuing user feedback has resulted in the

Texas DPS to hire more workers for computer forensics

Texas Department of Public Safety will hire more employees to help trim a backlog of computer-related investigations. A statement today from DPS says the goal is to decrease the time it takes to conduct forensic computer examinations, especially involving alleged

WiebeTech, Digital Reconnaissance and Voom Partner on Recon Series Forensic Kits

WiebeTech, a brand of CRU-DataPort™, has partnered with Voom Technologies™ and Digital Reconnaissance, Inc.™, a premier solutions provider for the digital forensics and legal discovery industries, to introduce the Recon Series™ computer forensics field kits at the Techno Forensics and

SAFE Corporation Offers CodeSuite Certification Online

Software Analysis & Forensic Engineering Corporation (www.SAFE-corp.biz) is now offering CodeSuite Certification online for software experts. Successful completion of the course adds the trainee to SAFE’s certified expert’s webpage http://www.safe-corp.biz/services_witnesses.htm, and they will receive a $500 credit toward the purchase

BlackBag Technologies Announces SoftBlock Write-Blocking Solution for Mac

BlackBag Technologies, Inc. today announced the release and general availability of SoftBlock, the Company’s much anticipated write-blocking software application that Mac forensic examiners can easily use to mount and manage devices containing suspect data in a forensically sound manner…With a

Profile of an IT forensics professional

A snapshot look at the IT forensics profession from the perspective of Rob Lee, an IT forensics expert at Mandiant… More (Computerworld)

Computer Forensics Proves “Balloon Boy” a Hoax

The Heene family’s e-mails secured by computer forensic engineers have proven the “Balloon Boy” stunt a hoax. The e-mails sent months before the event show Richard Heene and an associate discussing a media stunt similar to the balloon incident. Now,

Simple Steganography on NTFS when using the NSRL

A short paper from Adam Hurwitz of Business Intelligence Associates, Inc. titled “Simple Steganography on NTFS when using the NSRL” is now available here.

Adroit Photo Forensics released by Digital Assembly

Digital Assembly has released Adroit Photo Forensics, an advanced photo carving and forensics tool. It allows recovery of heavily fragmented photos and preparation of reports. Download a free trial from http://digital-assembly.com/products/adroit-photo-forensics/ (Note: Download is free, to save carved images, purchase