Digital Forensics Jobs Round-Up, August 18 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Evidentiary Songs Played by iPods

Some months ago we reported on the use of iPods as an educational tool, and provided information on schools and universities that have incorporated this technology for the benefit of their students. Our report today involves a more complex use

E-discovery’s here, but it doesn’t have to hurt

When headlines read, “Bear Sterns prosecutor builds case on e-mail,” how to keep or destroy electronically stored data may sound like a new business challenge. It doesn’t need to be, according to Derek Witte, who formerly practiced at Miller Johnson

UK Home Office mulls fighting hacking with corporate ASBOs

The Home Office is consulting on the possibility of applying serious crime prevention orders (AKA corporate ASBOs) to computer hacking laws. Serious crime prevention orders allow the courts to apply “injunctions” against criminal behaviour granted on the basis of the

TSK 3.0.0 and Autopsy 2.20 released

This major release of TSK contains many new library and tool features. * Orphan files (deleted files that have a metadata structure, but do not have a parent directory that can be reached from the root directory) are now shown

FBI sees rise in computer crime

Computer spying and theft of personal information have risen notably in the past year, costing tens of millions of dollars and threatening U.S. security, the FBI’s cyber division head said on Wednesday. FBI Assistant Director Shawn Henry told reporters that

UK cybercrime overhaul finally comes into effect

Updates to the ageing Computer Misuse Act (CMA) finally come into force in England and Wales on Wednesday (1 October). Modifications to the CMA – which was enacted in 1990 before the advent of the interweb – were included in

New book – iPhone Forensics

The iPhone has quickly become a marketing leader in mobile technology, finding its way into the corporate world and the everyday lives of millions of end users. Its wide range of functionality, combined with its “always on” design, make it

University of Florida IT Security Awareness Day

The first presentation was from Scott Moulton, who covered the issue of states enacting laws that require private investigator licenses for anyone doing computer forensics (and sometimes simple computer support and file recovery, depending on the law’s wording). The second

Coming soon: a Canadian cyber-security strategy

A national cyber-security strategy that will seek to protect key infrastructure as well as Canadians’ identities is on the way , an RCMP executive says. Details of the strategy — a partnership between the public and private sectors — will

UK police e-crime unit seeks industry recruits

Detective superintendent Charlie McMurdie of the Metropolitan Police Service — one of the architects of the Police Central e-Crime Unit announced on Tuesday — has proposed recruiting individuals from industry to assist the unit with investigations. Speaking at an event

Virginia Cops Excel In Computer Forensics Unit

The Arlington County (Virginia) Police Department Computer Forensic Unit (CFU) was established approximately 12 years ago and serves as a support unit. It has played a critical role in solving diverse crimes. The unit is involved in the collection and

NetSecurity Corporation Offers Computer Forensics Training Courses

NetSecurity Corporation expands its portfolio of Hands-On How-To® security courses to include computer forensics training classes. “Rather than focus on boot-camp style training that emphasizes cramming to pass a certification exam, we [NetSecurity] take a different approach to teaching professionals

Ithaca computer forensics company gets grant

The U.S. Department of Justice has awarded two grants totaling $149,977 to Wetstone Technologies Inc. in Ithaca under the National Institute of Justice Continuation Awards Program to enable the company to acquire evidence from computer systems more quickly and reduce

Electronic evidence tampering on the rise

E-mail messages, Excel spreadsheets and customer databases are featuring increasingly in cases of fraud, defamation and information theft, which gives wrongdoers more reason than ever to tamper with these electronic pieces of evidence. How well they do it could make

Portrait Of A Computer Forensic Examiner

Ives Potrafka, a forensic examiner with the Center for Computer Forensics, sees a lot of data theft. Those responsible tend to be ex-employees, either starting up a company while employed or going to a competitor and taking trade secrets. According