Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

F-Response Beta Program

Agile Risk Management LLC announces today the start of an official F-Response Beta Testing program. In order to become a part of the F-Response Beta Testing program, registered customers should send an email to F-Response Support (support _at_ f-response.com) with

Gallery: Tools for CSI cybercrime

The digital forensics unit (DFU) of the Australia Serious Fraud Office sniffs out incriminating evidence from crime scenes with ZDNet Australia on hand collecting clues. Armed with laptops and suitcases containing specialist forensic tools the 21-strong team can swiftly capture

Computer Issues When Key Personnel Defect

My firm provides digital forensics and e-discovery services. Most of our digital forensics investigations and analyses involve employees who have left their former employers for a rival or to start their own business. Our investigations focus on a constellation of

RevEnge hex viewer

RevEnge is a fully featured hex viewer designed with Reverse Engineering in mind (hence the name). It comes with features not seen in other Hex viewers such as its ability to perform on the fly decompression of ZLib compressed data,

A forum for fraudsters

In the last few days, I’ve entered a whole new web world. It’s a place where people speak of getting “dumps… sniffed from ATMs” or using “blinds to cash out” or getting data through “rj 45 taps.” The language belongs

Do RIAA Snoops Need PI Licenses?

By now, we all know how the Recording Industry Association of America nabs alleged file sharers, more than 20,000 lawsuits and counting: Hired snoops from MediaSentry – aka SafeNet – log onto Kazaa, Limewire or other file sharing programs, peer

Thoughts on Virtualization Forensics

Acquiring disks is a very important part of digital forensics. In my past blogs I discussed some aspects of forensics with respect to VMware ESX servers. This is the last part of the series. To acquire a VM from a

Moving ESI as Real Evidence

John Simek, a computer forensic examiner in Fairfax, Va., recently had a woman come to his office after a divorce proceeding. In court, her husband had presented some mean-spirited e-mails she supposedly sent him from a free Hotmail e-mail account,

Forensic Focus LinkedIn group

A new LinkedIn group for Forensic Focus members and the wider computer forensics community has been launched. The group’s homepage can be accessed at http://www.linkedin.com/e/gis/693917 If you would like to expand your professional network please consider joining!

Black Hat 2008 Aftermath

As always, the 2008 Black Hat security conference in Las Vegas was full of cutting-edge computer security research, the latest in computer security vulnerabilities, and more than a little controversy. Since the beginning of the Black Hat conference 15 years

UK computer forensics firm opens mobile phone lab

Computer forensics firm CY4OR, which helps police to crack criminal cases, has opened a mobile phone laboratory at its Bury headquarters as it looks to expand. The company, founded by Joel Tobias in 2002, has seen turnover double to £1.3m

Meet A-Z: The computer hacker behind a cybercrime wave

He goes by the nickname A-Z and is one of Russia’s bright young tech stars. He’s a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions. Trouble is, A-Z’s masterstroke is a computer

Vista Security Rendered Useless?

This week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered

U.S. Helps South Africa’s Computer Forensics Skills

THE US government has thrown its weight behind the training of South African state officials in computer forensics in a bid to build SA’s capacity to fight intellectual property (IP) and counterfeit crimes. The training, which took place last month

Computer forensic awareness urged in Pakistan

Speakers at a seminar on “What is Computer Forensic?” stressed the need for launching a campaign to create awareness among the people about cyber crimes besides introducing new degree courses on computer forensic at college and university level to make