Digital Forensics Round-Up, August 06 2025

Hero Image

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Thoughts on Virtualization Forensics

Acquiring disks is a very important part of digital forensics. In my past blogs I discussed some aspects of forensics with respect to VMware ESX servers. This is the last part of the series. To acquire a VM from a

Moving ESI as Real Evidence

John Simek, a computer forensic examiner in Fairfax, Va., recently had a woman come to his office after a divorce proceeding. In court, her husband had presented some mean-spirited e-mails she supposedly sent him from a free Hotmail e-mail account,

Forensic Focus LinkedIn group

A new LinkedIn group for Forensic Focus members and the wider computer forensics community has been launched. The group’s homepage can be accessed at http://www.linkedin.com/e/gis/693917 If you would like to expand your professional network please consider joining!

Black Hat 2008 Aftermath

As always, the 2008 Black Hat security conference in Las Vegas was full of cutting-edge computer security research, the latest in computer security vulnerabilities, and more than a little controversy. Since the beginning of the Black Hat conference 15 years

UK computer forensics firm opens mobile phone lab

Computer forensics firm CY4OR, which helps police to crack criminal cases, has opened a mobile phone laboratory at its Bury headquarters as it looks to expand. The company, founded by Joel Tobias in 2002, has seen turnover double to £1.3m

Meet A-Z: The computer hacker behind a cybercrime wave

He goes by the nickname A-Z and is one of Russia’s bright young tech stars. He’s a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions. Trouble is, A-Z’s masterstroke is a computer

Vista Security Rendered Useless?

This week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered

U.S. Helps South Africa’s Computer Forensics Skills

THE US government has thrown its weight behind the training of South African state officials in computer forensics in a bid to build SA’s capacity to fight intellectual property (IP) and counterfeit crimes. The training, which took place last month

Computer forensic awareness urged in Pakistan

Speakers at a seminar on “What is Computer Forensic?” stressed the need for launching a campaign to create awareness among the people about cyber crimes besides introducing new degree courses on computer forensic at college and university level to make

AccessData® Adds Network Forensic Technology to Product Portfolio

AccessData has announced the addition of network forensics capabilities to its product portfolio. “For the last year, we have aggressively evaluated countless network forensic solutions but only one had the power and flexibility needed to meet the challenges of our

Nigerian IT group pushes forensic training

The Nigeria Computer Society (NCS) has called on the country’s government to train civil servants in computer forensic technology as a way to fight e-commerce fraud in the country. NCS President Charles Uwadia made the call in a communiqué of

Computer crime: He may be a nerd, but he’s ours

For two years Gary McKinnon, an unemployed Scotsman armed with only some spliffs, a few beers, and a dial-up internet connection, went looking for beings of superior intelligence. He couldn’t find them. Instead, he found the US Military-Industrial Complex, an

Computer Forensics: Beyond the Magnifying Glass

Recent advances in computer forensics technology are helping law enforcement officials enhance their investigations while allowing corporations to track their employees’ online habits. Live forensics, for instance – which lets users examine data that is actively running in memory –

The SFO’s digital forensics unit

The future of the Serious Fraud Office is in doubt after the collapse of their case against five drug firms accused of ripping off the NHS. It was an eight-year investigation that cost the taxpayer tens of millions of pounds.

Jones Dykstra Computer Forensics Experts Announce JDAFTS Forensic Tool Suite

As of today, Maryland-based Jones Dykstra & Associates (www.jonesdykstra.com) is offering free download of their new computer forensics software tool suite, JDAFTS. JDAFTS, which stands for Jones Dykstra & Associates Forensic Tool Suite, includes case data management applications that extend