Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Vere Software Launches WebCase

WebCase(TM), the flagship product of Vere Software, enables law enforcement, corporations and government agencies to collect, preserve and present, from the Internet, evidentiary data including web captures, video recording, TCP/IP collection, image captures, keystroke logging and chat collection… More (VereSoftware)

Fresh New Face for Forensics Tool

A lot of IT professionals who get started with forensics see graphical forensic applications like Encase and Forensic Toolkit (FTK), and they get turned off when they see that the Sleuth Kit is a collection of command-line utilities. While there

Video of detective detailing Entwistle computer searches

A computer forensic expert continued testimony Wednesday in the Neil Entwistle murder trial. Police detective Lawrence James discussed with he found during a search of Entwistle’s laptop computer. Lawrence James told a Middlesex Superior Court jury yesterday that Entwistle did

Man Cleared of CP Charges After Hiring Computer Forensics Expert

[Here’s an article with more technical details on this earlier story – Jamie] Here’s a lesson for computer neophytes – when you get accused of having CP on your computer, subsequently get fired, lose your friends and family and face

How To Take Back Control Of The Discovery Process And Control Litigation Costs

For in-house attorneys, the costs of discovery rise when Electronically Stored Information (ESI) is uncontrolled. The objective of the litigation readiness process is to make sure that the IT professionals and the legal professionals, who certainly speak different languages, understand

Malware not man blamed in child abuse download case

A Department of Industrial Accidents investigator has been cleared of CP possession charges after a forensic investigation revealed that malware was to blame for depraved smut on his company laptop. Michael Fiola, 53, of Rhode Island, went through a massive

Internet companies to block CP sites

Verizon, Sprint and Time Warner Cable have agreed to block Internet bulletin boards and websites nationwide that disseminate CP, New York’s attorney general announced on Tuesday. The ISPs also agreed with New York Attorney General Andrew Cuomo to contribute more

Weak Evidence Links Congressmen’s Cyber-attacks to China

U.S. House of Representatives members who worry that China may have been responsible for attacks on their computers have provided little evidence to back up their claims, according to computer security experts…”It’s so very hard to conclude that something came

Live Acquisition and Triage tool for Law Enforcement

WetStone Technologies, Inc. announces U3 Live Investigator, a live acquisition and triage tool using U3 technology that is being created under the USB Live Acquisition and Triage Tool (US-LATT) contract funded by the National Institute of Justice (NIJ). U3 Live

North Wales Police launch firm to crack e-crime

North Wales Police have launched a crime fighting business to step up their fight against computer and mobile phone crime. Police and BIC Innovation have joined forces to launch DATRIS – Data Recovery & Investigation Service – a private enterprise

Help Needed with Encrypting Virus

After discovering a new and improved virus that encrypts important files on infected machines, researchers from Kaspersky are calling on fellow security professionals to lend a hand in cracking the massive key needed to liberate the ensnared data. The call

Rules of Evidence – Digital Forensics Tools

Forensics tools are often confused with other classifications of tools, such as incident management, e-discovery and data recovery. But while they can be used for those purposes, the difference is that they abide by formal evidence processing protocols such as

University of Cape Town (UCT) teaches computer forensics

The University of Cape Town (UCT) is training its first 15 postgraduates in computer forensics as part of an effort to establish a “centre of excellence” to combat, investigate and prosecute computer crime. UCT is from this year offering an

FTK 2.0 and “evidence leakage”

“They are now allowing EVIDENCE outside of the forensic lab. Not in the sense of copying data, but viewing the data, which due to caching is essentially the same as copying. This is not what I would consider acceptable in

Purdue prof schools law enforcement on Mac “cyber forensics”

Dr. Marc Rogers, Director of Cyber Forensics at Purdue University, is leading a three-day crash course for law enforcement officers from around the state of Indiana this week. He hopes this will be the first of many such training sessions