Digital Forensics Jobs Round-Up, August 04 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

BKForensics reveals the secrets of the cell phone

True story: The Orlando (Fla.) Police Department is taking a homicide suspect to trial. The bad guy’s cell phone is being held as evidence. Apply sophisticated software to reconstruct deleted files and — what have we here? We see the

Voom Technologies Releases HardCopy 3

Voom Technologies (www.voomtech.com) has released HardCopy 3 (HC3), a faster, upgraded and enriched version of their renowned HardCopy 2 computer forensics hard-drive duplicator. HC3 offers data transfer speeds of up to 7.5 GB/min., eclipsing Voom’s own HardCopy 2. The HC3

Does the Internet Need its Own Police Force?

2008 has been a year of growth in malware, infections, botnets and criminal profits. Recently, some security experts called for the punishment of these criminal activities. Criminal activity for financial gain remains the driver for the massive increase in Internet

The Hash Algorithm Dilemma – Hash Value Collisions

Recently, research and news has created a great deal of discussion about hash algorithms and their validity for forensic uses. Over the past several years, the primary hash algorithm used in forensic applications, MD5, has been compromised for use in

BCS forms cybercrime forensics group

A spike in UK-based cyber crime has prompted the British Computer Society (BCS) to form a new specialist group in the fight against online fraud. The BCS Cybercrime Forensics Specialist Group will gather and interpret digital evidence for investigations, as

UK police: ‘We need crime breathalysers for PCs’

UK police are hoping to one day develop a breathalyser-style tool for computers that could instantly flag up illegal activity on any PC it’s attached to. Detective superintendent Charlie McMurdie, architect of the UK’s Police Central E-crime Unit (PCeU), said

Ineffective law enforcement, bad economy fueling cybercrime

Cybercriminals operating worldwide are benefitting from ineffective law enforcement and a growing economic recession that could make jittery people more susceptible to cybercrime scams. So concludes security firm McAfee in its new report, “Virtual Criminology Report—Cybercrime vs. Cyberlaw.” published Tuesday.

Paraben releases Device Seizure Field Kit

Paraben has released the Device Seizure Field Kit. Rugged, portable, and expandable, this comprehensive handheld forensic field kit allows you to take your lab out into the field to perform complete forensic exams of cell phones, PDAs, GPS devices, and

UK businesses urged to devise digital-forensics plans

Firms should put in place forensics plans for incidents that may require computer evidence to be handed over, according to an influential security body. The Information Assurance Advisory Council (IAAC) published a report on Tuesday that aims to provide organisations

PmExplorer released

PmExplorer is a forensic software tool for the review and examination of PM files for Nokia mobile telephones. PM files can be obtained with third party hardware and software utilities such as sarasoft and the SHU box. PmExplorer differs from

Device Seizure v2.2 Released

Paraben has announced the release of Device Seizure v2.2 which is now available in a portable, expandable field kit. This new version adds two new iPhone plug-ins… What’s New: iPhone Advanced Logical Plug-inThis plug-in allows you to make a backup

WetStone Offers New Training Courses for 2009

WetStone has announced new training courses for 2009. Courses are offered in various locations and cybersecurity conferences and include… Hacking Bootcamp: Exploits and Live Incident InvestigationZombies and Botnets: Setup-Investigate-ShutdownIntroduction to Steganography: Steganography and Data ExfiltrationAdvanced Steganography: Demystifying Steganography Investigation More

The Julie Amero case, part II: May the farce be with you

The Julie Amero case has stirred up a lot of emotions, including some from Cringe readers who feel I was less than fair in my description of the expert witness hired by Amero’s attorney, Herb Horner. You know what? They’re

Guidance Software: Recent Considerations for Investment

On November 4th, Guidance Software announced that on October 6th it had received a $4.50 per share takeover proposal from AccessData Corp. of Linden, Utah. The company subsequently rejected the offer. This is another sign of confidence that management believes

An exclusive look inside the FBI

Amateur photographer, and now an expert in gathering hi-tech information, FBI Special Agent Jim Talley uses both passions to make a case. “Hopefully, I’m protecting my neighbors, my friends and my community. I would say that is my personal satisfaction

Why Examination Protocols Are Problematic

Forensic examination lays bare a user’s computer activity. Personal, confidential and privileged communications, sexual misadventure, financial and medical record keeping, proprietary business data and other sensitive information are all exposed. In the white-picket-fenced places where active data lives, you can