Digital Forensics Jobs Round-Up, August 04 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Police may have beaten encryption key out of suspect

When criminals turn to disk encryption to hide the evidence of their crimes, law enforcement investigations can hit a brick wall. Where digital forensics software has failed to recover encryption passwords, one tried and true technique remains: violence. It is

Digital Forensics & Incident Response Go Live

The days of performing only traditional “dead” forensics on a host after a security incident are over. A shift to “live” forensics and incident response investigations is underway, with a round of new tools focused specifically on collecting volatile data

Evidentiary Songs Played by iPods

Some months ago we reported on the use of iPods as an educational tool, and provided information on schools and universities that have incorporated this technology for the benefit of their students. Our report today involves a more complex use

E-discovery’s here, but it doesn’t have to hurt

When headlines read, “Bear Sterns prosecutor builds case on e-mail,” how to keep or destroy electronically stored data may sound like a new business challenge. It doesn’t need to be, according to Derek Witte, who formerly practiced at Miller Johnson

UK Home Office mulls fighting hacking with corporate ASBOs

The Home Office is consulting on the possibility of applying serious crime prevention orders (AKA corporate ASBOs) to computer hacking laws. Serious crime prevention orders allow the courts to apply “injunctions” against criminal behaviour granted on the basis of the

TSK 3.0.0 and Autopsy 2.20 released

This major release of TSK contains many new library and tool features. * Orphan files (deleted files that have a metadata structure, but do not have a parent directory that can be reached from the root directory) are now shown

FBI sees rise in computer crime

Computer spying and theft of personal information have risen notably in the past year, costing tens of millions of dollars and threatening U.S. security, the FBI’s cyber division head said on Wednesday. FBI Assistant Director Shawn Henry told reporters that

UK cybercrime overhaul finally comes into effect

Updates to the ageing Computer Misuse Act (CMA) finally come into force in England and Wales on Wednesday (1 October). Modifications to the CMA – which was enacted in 1990 before the advent of the interweb – were included in

New book – iPhone Forensics

The iPhone has quickly become a marketing leader in mobile technology, finding its way into the corporate world and the everyday lives of millions of end users. Its wide range of functionality, combined with its “always on” design, make it

University of Florida IT Security Awareness Day

The first presentation was from Scott Moulton, who covered the issue of states enacting laws that require private investigator licenses for anyone doing computer forensics (and sometimes simple computer support and file recovery, depending on the law’s wording). The second

Coming soon: a Canadian cyber-security strategy

A national cyber-security strategy that will seek to protect key infrastructure as well as Canadians’ identities is on the way , an RCMP executive says. Details of the strategy — a partnership between the public and private sectors — will

UK police e-crime unit seeks industry recruits

Detective superintendent Charlie McMurdie of the Metropolitan Police Service — one of the architects of the Police Central e-Crime Unit announced on Tuesday — has proposed recruiting individuals from industry to assist the unit with investigations. Speaking at an event

Virginia Cops Excel In Computer Forensics Unit

The Arlington County (Virginia) Police Department Computer Forensic Unit (CFU) was established approximately 12 years ago and serves as a support unit. It has played a critical role in solving diverse crimes. The unit is involved in the collection and

NetSecurity Corporation Offers Computer Forensics Training Courses

NetSecurity Corporation expands its portfolio of Hands-On How-To® security courses to include computer forensics training classes. “Rather than focus on boot-camp style training that emphasizes cramming to pass a certification exam, we [NetSecurity] take a different approach to teaching professionals

Ithaca computer forensics company gets grant

The U.S. Department of Justice has awarded two grants totaling $149,977 to Wetstone Technologies Inc. in Ithaca under the National Institute of Justice Continuation Awards Program to enable the company to acquire evidence from computer systems more quickly and reduce