Digital Forensics Round-Up, August 06 2025

Hero Image

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

The Tangled Web Mail We Weave and Leave

It is an understatement to observe that the focus, if not the obsession, of e-discovery production today is the production of e-mail. In the prototypical e-discovery matter a company has an e-mail server and workstations (desktop or laptop computers) and

Cold Boot Attack Utilities Released At HOPE Conference

Jacob Appelbaum, one of the security researchers who worked on the cold boot attacks to recover encryption keys from memory even after reboot, has announced the release of the complete source code for the utilities at The Last HOPE in

Law troubles computer repairmen, sparks lawsuit

Texas legislators may have unintentionally ensnared some computer repairmen in a web of rules and regulations designed for private detectives. The law, passed last year, criminalizes the investigation of certain computer problems without a private investigator’s license. Private investigators support

TrueCrypt not as deniable as thought

It may not be possible after all to conceal the existence of a sensitive file on a machine. BT security expert Bruce Schneier and a group of researchers have hacked an ultra-paranoid feature in the TrueCrypt open-source disk encryption tool

Romainian authorities arrest cybercrime suspects

Authorities have arrested more than 20 people in Romania who are suspected of running online fraud schemes, according to media reports. The Tuesday arrests were confirmed by the U.S. Federal Bureau of Investigation, which has been working with Romanian officials

Houston FBI opens big new digital crime lab

Trying to keep pace with criminals who increasingly store damaging evidence on high-tech devices, the FBI today opened a digital forensics laboratory four times the size of a facility it used to plow through the files of energy giant Enron.

How Lying Eyes was caught in cyber trap

Though it has a low profile, the Gardai’s computer forensic unit – which is based in the force’s national bureau of fraud investigation (GBFI) – is rapidly developing a reputation for excellence across European police forces. In part, this is

Computer Crime Law in Thailand could be amended

The Computer Association of Thailand may propose an amendment of the Computer Crime Law, saying the first year of enforcement was causing many problems for users. Association president Srisak Jamornmarn said a seminar on computer crime would be held on

Computer forensics – a booming business

The primary concern of forensics experts is to collect evidence that meets well-established criteria laid down by the law. “The rules of evidence are not new for computers,” says Sean Lin, a director, Information Security Audit & Control Association (ISACA).

Even computer ‘wipers’ leave a mark

When British software developers came up with a program that could wipe files from computer hard drives, they gave it a hard-core name: Evidence Eliminator. It gets the point across, but can sure sound bad if a user gets hauled

Fighting crime with a click of a mouse in Thailand

Instead of a pistol, Pol Lt-Col Panya Chaaimtet arms himself with a computer notebook. He is more agile manoeuvring a mouse, hunting for criminals on the internet, than handling a conventional weapon… Pol Lt-Col Panya and Pol Maj Mingmontri work

VidReport from Sanderson Forensics

VidReport from Sanderson Forensics (www.sandersonforensics.com) is a new forensic tool designed to ease the burden on investigators dealing with either large video files or multiple video files. VidReport allows the investigator to create reports based upon the content of a

BlackBag Technologies Relocates Silicon Valley Corporate Headquarters

BlackBag Technologies, Inc., a leading provider of computer forensic and electronic discovery solutions, today announced the relocation of its worldwide headquarters to 300 Piercy Road in San Jose, California. The move follows the Company’s 5th anniversary and continued growth of

White Paper: Selecting a Computer Forensic Expert

As digital evidence continues to become more common in litigation, so has the need for computer forensic experts. In some situations the success or failure of the entire case might be driven by the findings provided to the litigating attorney

Deep inside the Serious Fraud Office’s digital forensics unit

Deep inside London’s legal quarter, a camera is fastened tightly over the latest mobile device, scrutinising every move the Serious Fraud Office is taking in its digital forensics unit. There is no room for error. If the unit’s forensic scientists