Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Hero Image

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Transforming Mental Health And Organisational Culture In Digital Forensics

Transforming Mental Health And Organisational Culture In Digital Forensics

Discover how Adapt & Evolve is helping transform digital forensic units through trauma-informed, evidence-based workshops on stress, psychological safety, and leadership....read more

Meet A-Z: The computer hacker behind a cybercrime wave

He goes by the nickname A-Z and is one of Russia’s bright young tech stars. He’s a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions. Trouble is, A-Z’s masterstroke is a computer

Vista Security Rendered Useless?

This week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered

U.S. Helps South Africa’s Computer Forensics Skills

THE US government has thrown its weight behind the training of South African state officials in computer forensics in a bid to build SA’s capacity to fight intellectual property (IP) and counterfeit crimes. The training, which took place last month

Computer forensic awareness urged in Pakistan

Speakers at a seminar on “What is Computer Forensic?” stressed the need for launching a campaign to create awareness among the people about cyber crimes besides introducing new degree courses on computer forensic at college and university level to make

AccessData® Adds Network Forensic Technology to Product Portfolio

AccessData has announced the addition of network forensics capabilities to its product portfolio. “For the last year, we have aggressively evaluated countless network forensic solutions but only one had the power and flexibility needed to meet the challenges of our

Nigerian IT group pushes forensic training

The Nigeria Computer Society (NCS) has called on the country’s government to train civil servants in computer forensic technology as a way to fight e-commerce fraud in the country. NCS President Charles Uwadia made the call in a communiqué of

Computer crime: He may be a nerd, but he’s ours

For two years Gary McKinnon, an unemployed Scotsman armed with only some spliffs, a few beers, and a dial-up internet connection, went looking for beings of superior intelligence. He couldn’t find them. Instead, he found the US Military-Industrial Complex, an

Computer Forensics: Beyond the Magnifying Glass

Recent advances in computer forensics technology are helping law enforcement officials enhance their investigations while allowing corporations to track their employees’ online habits. Live forensics, for instance – which lets users examine data that is actively running in memory –

The SFO’s digital forensics unit

The future of the Serious Fraud Office is in doubt after the collapse of their case against five drug firms accused of ripping off the NHS. It was an eight-year investigation that cost the taxpayer tens of millions of pounds.

Jones Dykstra Computer Forensics Experts Announce JDAFTS Forensic Tool Suite

As of today, Maryland-based Jones Dykstra & Associates (www.jonesdykstra.com) is offering free download of their new computer forensics software tool suite, JDAFTS. JDAFTS, which stands for Jones Dykstra & Associates Forensic Tool Suite, includes case data management applications that extend

The Tangled Web Mail We Weave and Leave

It is an understatement to observe that the focus, if not the obsession, of e-discovery production today is the production of e-mail. In the prototypical e-discovery matter a company has an e-mail server and workstations (desktop or laptop computers) and

Cold Boot Attack Utilities Released At HOPE Conference

Jacob Appelbaum, one of the security researchers who worked on the cold boot attacks to recover encryption keys from memory even after reboot, has announced the release of the complete source code for the utilities at The Last HOPE in

Law troubles computer repairmen, sparks lawsuit

Texas legislators may have unintentionally ensnared some computer repairmen in a web of rules and regulations designed for private detectives. The law, passed last year, criminalizes the investigation of certain computer problems without a private investigator’s license. Private investigators support

TrueCrypt not as deniable as thought

It may not be possible after all to conceal the existence of a sensitive file on a machine. BT security expert Bruce Schneier and a group of researchers have hacked an ultra-paranoid feature in the TrueCrypt open-source disk encryption tool

Romainian authorities arrest cybercrime suspects

Authorities have arrested more than 20 people in Romania who are suspected of running online fraud schemes, according to media reports. The Tuesday arrests were confirmed by the U.S. Federal Bureau of Investigation, which has been working with Romanian officials