Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

Ineffective law enforcement, bad economy fueling cybercrime

Cybercriminals operating worldwide are benefitting from ineffective law enforcement and a growing economic recession that could make jittery people more susceptible to cybercrime scams. So concludes security firm McAfee in its new report, “Virtual Criminology Report—Cybercrime vs. Cyberlaw.” published Tuesday.

Paraben releases Device Seizure Field Kit

Paraben has released the Device Seizure Field Kit. Rugged, portable, and expandable, this comprehensive handheld forensic field kit allows you to take your lab out into the field to perform complete forensic exams of cell phones, PDAs, GPS devices, and

UK businesses urged to devise digital-forensics plans

Firms should put in place forensics plans for incidents that may require computer evidence to be handed over, according to an influential security body. The Information Assurance Advisory Council (IAAC) published a report on Tuesday that aims to provide organisations

PmExplorer released

PmExplorer is a forensic software tool for the review and examination of PM files for Nokia mobile telephones. PM files can be obtained with third party hardware and software utilities such as sarasoft and the SHU box. PmExplorer differs from

Device Seizure v2.2 Released

Paraben has announced the release of Device Seizure v2.2 which is now available in a portable, expandable field kit. This new version adds two new iPhone plug-ins… What’s New: iPhone Advanced Logical Plug-inThis plug-in allows you to make a backup

WetStone Offers New Training Courses for 2009

WetStone has announced new training courses for 2009. Courses are offered in various locations and cybersecurity conferences and include… Hacking Bootcamp: Exploits and Live Incident InvestigationZombies and Botnets: Setup-Investigate-ShutdownIntroduction to Steganography: Steganography and Data ExfiltrationAdvanced Steganography: Demystifying Steganography Investigation More

The Julie Amero case, part II: May the farce be with you

The Julie Amero case has stirred up a lot of emotions, including some from Cringe readers who feel I was less than fair in my description of the expert witness hired by Amero’s attorney, Herb Horner. You know what? They’re

Guidance Software: Recent Considerations for Investment

On November 4th, Guidance Software announced that on October 6th it had received a $4.50 per share takeover proposal from AccessData Corp. of Linden, Utah. The company subsequently rejected the offer. This is another sign of confidence that management believes

An exclusive look inside the FBI

Amateur photographer, and now an expert in gathering hi-tech information, FBI Special Agent Jim Talley uses both passions to make a case. “Hopefully, I’m protecting my neighbors, my friends and my community. I would say that is my personal satisfaction

Why Examination Protocols Are Problematic

Forensic examination lays bare a user’s computer activity. Personal, confidential and privileged communications, sexual misadventure, financial and medical record keeping, proprietary business data and other sensitive information are all exposed. In the white-picket-fenced places where active data lives, you can

Proof: Pop-Up Teacher is Innocent, Despite Misdemeanor Plea

Accused of letting impressionable students see pornographic pictures as she browsed the web in her classroom, former Connecticut school teacher Julie Amero dodged felony charges last Friday by agreeing to plead guilty to a single misdemeanor charge and surrendering her

The mobile device investigator’s toolbox

These days, virtually every major criminal activity leaves evidence — images, text messages, call records and more — on mobile devices. Yet for the investigator who knows only the basics or less about how to recover this evidence, building a

Five Essential Computer Forensics Tools

I recently had a look at the most recent CSI security survey. While a lot of things have changed over the past year, one thing is definitely consistent: attacks happen. At one point, attacks on companies were as high as

Judge: No cryptographic hash analysis without warrant

In a case that could have important implications for law enforcement investigations throughout the US, a federal judge has ruled that the cryptographic fingerprinting of suspects’ hard drives constitutes a search for purposes of the Constitution… More (The Register)

UK businesses lack confidence in police e-crime handling

Businesses are not confident that the police have the necessary resources or technical knowledge to deal with e-crime effectively, a survey has found…”In our experience, few electronic crimes are taken seriously by the police,” said one respondent to the survey.

Police enlist AI to help tackle crime

Looking at how AI techniques can boost digital forensics, the UK government-funded Cyber Security Knowledge Transfer Network (KTN) will examine the potential use of AI in web counter-terrorism surveillance, fighting internet fraud, masking identities online and data mining. The KTN