Digital Forensics Jobs Round-Up, August 18 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Five Essential Computer Forensics Tools

I recently had a look at the most recent CSI security survey. While a lot of things have changed over the past year, one thing is definitely consistent: attacks happen. At one point, attacks on companies were as high as

Judge: No cryptographic hash analysis without warrant

In a case that could have important implications for law enforcement investigations throughout the US, a federal judge has ruled that the cryptographic fingerprinting of suspects’ hard drives constitutes a search for purposes of the Constitution… More (The Register)

UK businesses lack confidence in police e-crime handling

Businesses are not confident that the police have the necessary resources or technical knowledge to deal with e-crime effectively, a survey has found…”In our experience, few electronic crimes are taken seriously by the police,” said one respondent to the survey.

Police enlist AI to help tackle crime

Looking at how AI techniques can boost digital forensics, the UK government-funded Cyber Security Knowledge Transfer Network (KTN) will examine the potential use of AI in web counter-terrorism surveillance, fighting internet fraud, masking identities online and data mining. The KTN

Passware Exposes Private Data Indexed by Windows Search

Search Index Examiner lists all the documents, emails, and spreadsheets, as well as providing creation and modification dates, author, recipients, summary content, and other information for each item. The only data it needs from the target computer is a Windows

“Breath tests” for PCs heralds stop and scan

Technology that claims to pick up traces of illicit images on PCs has attracted the interest of Australian cops. The software, developed in an Australian University, might eventually be used to screen PCs during border inspections. Compared to breath test

University develops digital fingerprinting technology

Security experts say an innovative technology, codenamed ‘digital DNA’, offers a completely new perspective on tracking computer activity. It is based on a novel collection and analysis technique that identifies sequences in user access of data, leaving behind a digital

Digital Technology Footprints Trip Up Suspects

The man denied any wrongdoing, but Lakeland police had something on him – his cell phone. Since the department founded its intelligence unit in 2001, cell phones, computers, MP3 players, and many other forms of digital technology have taken on

SANS Announces New Resources for Computer Forensics

Forensics experts tend to work alone or in small groups and have few ways of sharing the most important lessons they are learning. SANS is trying to fill that gap in part because SANS trained many of the most effective

Secure Hash Competition Kicks Off

Dozens of amateur and professional cryptographers signed up last week for the United States’ first open competition to create a secure algorithm for generating hashes – the digital fingerprints widely used in a variety of security functions. The contest, run

AccessData offer for Guidance Software announced, rejected

AccessData Corporation has announced that on October 6th it sent a letter to Guidance Software expressing its interest in acquiring all of the company’s outstanding stock. On Friday October 31st, AccessData reports that it received a reply from Guidance Software

Computer crime soars in UK

Computer related crimes have risen by almost 10 percent in the UK last year alone, according to online identity firm, Garlick. The report claims that over 3.5 million online crimes were committed in the UK in 2007 – most of

libpff (alpha) released for open source PST and OST forensics

An alpha version of libpff for forensic investigators using open source forensic tools has been released. Libpff is a library with tools to read, extract and recover deleted e-mails. The file format on the personal folder format can be found

South Texas College instructor writes Computer Forensics for Dummies

Rey Anzaldúa’s new book, Computer Forensics for Dummies, hit the shelves in October 2008 and is helping consumers sleuth their own digital trails. “People underestimate the amount of digital information they leave behind on digital devices and throughout the Internet

Police may have beaten encryption key out of suspect

When criminals turn to disk encryption to hide the evidence of their crimes, law enforcement investigations can hit a brick wall. Where digital forensics software has failed to recover encryption passwords, one tried and true technique remains: violence. It is

Digital Forensics & Incident Response Go Live

The days of performing only traditional “dead” forensics on a host after a security incident are over. A shift to “live” forensics and incident response investigations is underway, with a round of new tools focused specifically on collecting volatile data