Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Vista Security Rendered Useless?

This week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered

U.S. Helps South Africa’s Computer Forensics Skills

THE US government has thrown its weight behind the training of South African state officials in computer forensics in a bid to build SA’s capacity to fight intellectual property (IP) and counterfeit crimes. The training, which took place last month

Computer forensic awareness urged in Pakistan

Speakers at a seminar on “What is Computer Forensic?” stressed the need for launching a campaign to create awareness among the people about cyber crimes besides introducing new degree courses on computer forensic at college and university level to make

AccessData® Adds Network Forensic Technology to Product Portfolio

AccessData has announced the addition of network forensics capabilities to its product portfolio. “For the last year, we have aggressively evaluated countless network forensic solutions but only one had the power and flexibility needed to meet the challenges of our

Nigerian IT group pushes forensic training

The Nigeria Computer Society (NCS) has called on the country’s government to train civil servants in computer forensic technology as a way to fight e-commerce fraud in the country. NCS President Charles Uwadia made the call in a communiqué of

Computer crime: He may be a nerd, but he’s ours

For two years Gary McKinnon, an unemployed Scotsman armed with only some spliffs, a few beers, and a dial-up internet connection, went looking for beings of superior intelligence. He couldn’t find them. Instead, he found the US Military-Industrial Complex, an

Computer Forensics: Beyond the Magnifying Glass

Recent advances in computer forensics technology are helping law enforcement officials enhance their investigations while allowing corporations to track their employees’ online habits. Live forensics, for instance – which lets users examine data that is actively running in memory –

The SFO’s digital forensics unit

The future of the Serious Fraud Office is in doubt after the collapse of their case against five drug firms accused of ripping off the NHS. It was an eight-year investigation that cost the taxpayer tens of millions of pounds.

Jones Dykstra Computer Forensics Experts Announce JDAFTS Forensic Tool Suite

As of today, Maryland-based Jones Dykstra & Associates (www.jonesdykstra.com) is offering free download of their new computer forensics software tool suite, JDAFTS. JDAFTS, which stands for Jones Dykstra & Associates Forensic Tool Suite, includes case data management applications that extend

The Tangled Web Mail We Weave and Leave

It is an understatement to observe that the focus, if not the obsession, of e-discovery production today is the production of e-mail. In the prototypical e-discovery matter a company has an e-mail server and workstations (desktop or laptop computers) and

Cold Boot Attack Utilities Released At HOPE Conference

Jacob Appelbaum, one of the security researchers who worked on the cold boot attacks to recover encryption keys from memory even after reboot, has announced the release of the complete source code for the utilities at The Last HOPE in

Law troubles computer repairmen, sparks lawsuit

Texas legislators may have unintentionally ensnared some computer repairmen in a web of rules and regulations designed for private detectives. The law, passed last year, criminalizes the investigation of certain computer problems without a private investigator’s license. Private investigators support

TrueCrypt not as deniable as thought

It may not be possible after all to conceal the existence of a sensitive file on a machine. BT security expert Bruce Schneier and a group of researchers have hacked an ultra-paranoid feature in the TrueCrypt open-source disk encryption tool

Romainian authorities arrest cybercrime suspects

Authorities have arrested more than 20 people in Romania who are suspected of running online fraud schemes, according to media reports. The Tuesday arrests were confirmed by the U.S. Federal Bureau of Investigation, which has been working with Romanian officials

Houston FBI opens big new digital crime lab

Trying to keep pace with criminals who increasingly store damaging evidence on high-tech devices, the FBI today opened a digital forensics laboratory four times the size of a facility it used to plow through the files of energy giant Enron.

How Lying Eyes was caught in cyber trap

Though it has a low profile, the Gardai’s computer forensic unit – which is based in the force’s national bureau of fraud investigation (GBFI) – is rapidly developing a reputation for excellence across European police forces. In part, this is