Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Forensics with dd

http://www.informit.com/articles/article.aspx?p=27203&seqNum=3 This chapter is from the book SANS GIAC Certification: Security Essentials Toolkit (GSEC) Step-by-step instruction on how to image a hard drive with Linux’s dd program.

University teams up with computer forensics company

A Welsh university has teamed up with an American company to offer a world first in computer courses. The University of Glamorgan is working with AccessData to offer the first courses in the world to be accredited by the computer

New disk encryption standards could complicate data recovery

When the world’s largest disk-makers joined last week to announce a single standard for encrypting disk drives, the move raised questions among users about how to deal with full-disk encryption once it’s native on all laptop or desktop computers. For

DEC ‘hacker’ questions McKinnon political bandwagon

Boris Johnson’s outspoken defence of Gary McKinnon in his extradition fight has been criticised by a former security consultant, who complains he was denied such support when he himself was charged with hacking offences. Daniel Cuthbert was convicted in October

SAFE Corporation Releases CodeCross for Detecting Software IP Theft

Software Analysis & Forensic Engineering Corporation (www.SAFE-corp.biz) has just released a new tool for comparing computer code to detect copyright infringement and trade secret theft. CodeCross™ finds traces of non-functional source code that have been copied from one program to

New marching orders for wounded vets

The Walter Reed Army Medical Center in Washington is planning to train wounded soldiers in the science of digital forensics so they can become cybersecurity investigators. The three-year, $1 million project is primarily funded by the National Science Foundation. The

Purdue sponsoring Chicago conference on mobile forensics in May

Purdue University is inviting experts, investigators and researchers from around the world to take part in the second Mobile Forensics World Conference to be held in Chicago from May 26-30. The conference will bring together those who specialize in the

Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals

When Henry Ford brought affordable automobiles to the average U.S. citizen in 1908, he also improved the fortunes of criminals by ushering in Crime 1.0 – technology-assisted crime. Fast forward a century: Enter the computer and with it, Crime 2.0

Cybercrime threat rising sharply

The threat of cybercrime is rising sharply, experts have warned at the World Economic Forum in Davos. They called for a new system to tackle well-organised gangs of cybercriminals. Online theft costs $1 trillion a year, the number of attacks

Computer forensics videos – submit your favourites!

Forensic Focus now has a video section with the aim of listing online videos which are of interest to those in the computer forensics community. The main index can be found at http://www.forensicfocus.com/computer-forensics-videos (note, you need to be logged in

The Julie Amero case: Injustice for all

“The Julie Amero porn pop-up case should be history by now, but some folks just won’t let it die. Cringe has the scoop…Normally I try to let sleeping dogs lie. But this is one hound who keeps barking and won’t

SourceDetective, Internet Search for Software Plagiarism Released

Software Analysis & Forensic EngineeringCorporation (www.SAFE-corp.biz) has releasedSourceDetective(TM), a tool in its CodeSuite® set of software tools for comparing computer code to detect plagiarism, copyright infringement, and trade secret theft. SourceDetective helps definitively prove or disprove copying of source code

Google searches lead to murder conviction

5th Circuit Appeal court upheld a murder conviction based on Google searches and a suggestive Guns N’ Roses song he downloaded. He appealed on grounds that the evidence was wholly circumstantial and insufficient for conviction. A Florida state appeals court

Device Seizure 3.0 & P2 Commander 1.2 Released

Paraben has announced the release of Device Seizure v3.0 and P2 Commander 1.2. Both releases have new features. If you don’t have these products in your toolbox, you can add them for less than the annual maintenance on similar tools

HGBary Releases Windows Memory Investigation/Malware Analysis Platform

HBGary Responder Professional 1.3 allows security professionals, malware analysts and forensic investigators to more effectively and efficiently detect, diagnose and investigate computer crimes on live Windows computer systems…HBGary Responder Professional 1.3 fulfills many of the rigorous requirements that top computer