Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Man Cleared of CP Charges After Hiring Computer Forensics Expert

[Here’s an article with more technical details on this earlier story – Jamie] Here’s a lesson for computer neophytes – when you get accused of having CP on your computer, subsequently get fired, lose your friends and family and face

How To Take Back Control Of The Discovery Process And Control Litigation Costs

For in-house attorneys, the costs of discovery rise when Electronically Stored Information (ESI) is uncontrolled. The objective of the litigation readiness process is to make sure that the IT professionals and the legal professionals, who certainly speak different languages, understand

Malware not man blamed in child abuse download case

A Department of Industrial Accidents investigator has been cleared of CP possession charges after a forensic investigation revealed that malware was to blame for depraved smut on his company laptop. Michael Fiola, 53, of Rhode Island, went through a massive

Internet companies to block CP sites

Verizon, Sprint and Time Warner Cable have agreed to block Internet bulletin boards and websites nationwide that disseminate CP, New York’s attorney general announced on Tuesday. The ISPs also agreed with New York Attorney General Andrew Cuomo to contribute more

Weak Evidence Links Congressmen’s Cyber-attacks to China

U.S. House of Representatives members who worry that China may have been responsible for attacks on their computers have provided little evidence to back up their claims, according to computer security experts…”It’s so very hard to conclude that something came

Live Acquisition and Triage tool for Law Enforcement

WetStone Technologies, Inc. announces U3 Live Investigator, a live acquisition and triage tool using U3 technology that is being created under the USB Live Acquisition and Triage Tool (US-LATT) contract funded by the National Institute of Justice (NIJ). U3 Live

North Wales Police launch firm to crack e-crime

North Wales Police have launched a crime fighting business to step up their fight against computer and mobile phone crime. Police and BIC Innovation have joined forces to launch DATRIS – Data Recovery & Investigation Service – a private enterprise

Help Needed with Encrypting Virus

After discovering a new and improved virus that encrypts important files on infected machines, researchers from Kaspersky are calling on fellow security professionals to lend a hand in cracking the massive key needed to liberate the ensnared data. The call

Rules of Evidence – Digital Forensics Tools

Forensics tools are often confused with other classifications of tools, such as incident management, e-discovery and data recovery. But while they can be used for those purposes, the difference is that they abide by formal evidence processing protocols such as

University of Cape Town (UCT) teaches computer forensics

The University of Cape Town (UCT) is training its first 15 postgraduates in computer forensics as part of an effort to establish a “centre of excellence” to combat, investigate and prosecute computer crime. UCT is from this year offering an

FTK 2.0 and “evidence leakage”

“They are now allowing EVIDENCE outside of the forensic lab. Not in the sense of copying data, but viewing the data, which due to caching is essentially the same as copying. This is not what I would consider acceptable in

Purdue prof schools law enforcement on Mac “cyber forensics”

Dr. Marc Rogers, Director of Cyber Forensics at Purdue University, is leading a three-day crash course for law enforcement officers from around the state of Indiana this week. He hopes this will be the first of many such training sessions

LiveWire Investigator Version 4.0-Live Network Investigation

WetStone Technologies has unveiled LiveWire Investigator Version 4.0 for incident response, vulnerability assessment, compliance audits and criminal investigations. Features include physical memory imaging, application and process state discovery, Windows service discovery, active port mapping, Windows log discovery and analysis, remote

Bletchley Park – In need of repairs

I do realise that this is slightly off topic, but for those that believe like I do that the history of our profession is important, I’d like to bring this to your attention. http://www.theregister.co.uk/2008/05/30/bletchley_park/ http://www.bletchleypark.org.uk/news/docview.rhtm/516816 If you don’t already know,

Mobile Phone Forensics

It’s been 20 years since a UK drug dealer discovered too late the folly of keeping all his records on a Psion Organiser, helpfully providing police with names and addresses of customers and suppliers, as well as sales records. Today’s

Guidance Software to Offer HBGary Responderâ„¢ for Live Memory Analysis

Guidance Software Inc. has announced a strategic alliance with HBGary Inc., a leading provider of security assessment solutions and services. Through this relationship, Guidance Software adds HBGary‘s unique live memory (RAM and volatile data) analysis solutions to its portfolio of