Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Cyber Forensics in India: A Wake Up Call

Cyber Forensics is an important field of criminal investigation. However, it requires sound expertise to be practiced. In India we have very few experts who can provide cyber forensics services in an appropriate manner. Take for example the recent case

F-Response Beta Program

Agile Risk Management LLC announces today the start of an official F-Response Beta Testing program. In order to become a part of the F-Response Beta Testing program, registered customers should send an email to F-Response Support (support _at_ f-response.com) with

Gallery: Tools for CSI cybercrime

The digital forensics unit (DFU) of the Australia Serious Fraud Office sniffs out incriminating evidence from crime scenes with ZDNet Australia on hand collecting clues. Armed with laptops and suitcases containing specialist forensic tools the 21-strong team can swiftly capture

Computer Issues When Key Personnel Defect

My firm provides digital forensics and e-discovery services. Most of our digital forensics investigations and analyses involve employees who have left their former employers for a rival or to start their own business. Our investigations focus on a constellation of

RevEnge hex viewer

RevEnge is a fully featured hex viewer designed with Reverse Engineering in mind (hence the name). It comes with features not seen in other Hex viewers such as its ability to perform on the fly decompression of ZLib compressed data,

A forum for fraudsters

In the last few days, I’ve entered a whole new web world. It’s a place where people speak of getting “dumps… sniffed from ATMs” or using “blinds to cash out” or getting data through “rj 45 taps.” The language belongs

Do RIAA Snoops Need PI Licenses?

By now, we all know how the Recording Industry Association of America nabs alleged file sharers, more than 20,000 lawsuits and counting: Hired snoops from MediaSentry – aka SafeNet – log onto Kazaa, Limewire or other file sharing programs, peer

Thoughts on Virtualization Forensics

Acquiring disks is a very important part of digital forensics. In my past blogs I discussed some aspects of forensics with respect to VMware ESX servers. This is the last part of the series. To acquire a VM from a

Moving ESI as Real Evidence

John Simek, a computer forensic examiner in Fairfax, Va., recently had a woman come to his office after a divorce proceeding. In court, her husband had presented some mean-spirited e-mails she supposedly sent him from a free Hotmail e-mail account,

Forensic Focus LinkedIn group

A new LinkedIn group for Forensic Focus members and the wider computer forensics community has been launched. The group’s homepage can be accessed at http://www.linkedin.com/e/gis/693917 If you would like to expand your professional network please consider joining!

Black Hat 2008 Aftermath

As always, the 2008 Black Hat security conference in Las Vegas was full of cutting-edge computer security research, the latest in computer security vulnerabilities, and more than a little controversy. Since the beginning of the Black Hat conference 15 years

UK computer forensics firm opens mobile phone lab

Computer forensics firm CY4OR, which helps police to crack criminal cases, has opened a mobile phone laboratory at its Bury headquarters as it looks to expand. The company, founded by Joel Tobias in 2002, has seen turnover double to £1.3m

Meet A-Z: The computer hacker behind a cybercrime wave

He goes by the nickname A-Z and is one of Russia’s bright young tech stars. He’s a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions. Trouble is, A-Z’s masterstroke is a computer

Vista Security Rendered Useless?

This week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered

U.S. Helps South Africa’s Computer Forensics Skills

THE US government has thrown its weight behind the training of South African state officials in computer forensics in a bid to build SA’s capacity to fight intellectual property (IP) and counterfeit crimes. The training, which took place last month