Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

INTERPOL releases computer forensic report requested by Colombia

INTERPOL today presented the results of its forensic examination of eight seized FARC computer and hardware exhibits following a request for assistance in March of this year by Colombia, one of INTERPOL’s 186 member countries. INTERPOL Secretary General Ronald K.

CSI Stick: The Portable Cell Phone Forensic Tool

Paraben Corporation, a digital forensic technology provider, announced today that it has released the new Cell Seizure Investigator Stick (CSI Stick). The CSI Stick is a thumb drive size device that forensically acquires data from cell phones. This portable solution

WetStone Offers Training at Techno Security

WetStone will be hosting two pre-conference classes on May 30-31, 2008 at the 10th annual Techno Security Conference. The Live Investigator Training course is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in

Network forensics group test

Network-based tools covered some interesting territory. There are two classes of solutions that seem to be lumped into the network forensics category. The first incorporates all those offerings that do much of what traditional computer forensics tools do, only they

Trace Malware’s steps with RE:Trace

Reverse engineering is regarded as one of the most difficult specialties in the hacker community. The deconstruction and analysis of software and systems to understand their inner workings is a complex task. It requires a thorough understanding of kernel functions,

Computer Forensics Lab Awarded to New Mexico

The FBI announced recently that the state of New Mexico, in conjunction with the UNM Police Department, UNM Information Technology Services Department (ITS) and the NSA-certified UNM Anderson School of Management’s Center for Information Assurance Research and Education (CIARE), has

LTU Technologies Releases LTU-Finder 3.0 at CEIC

LTU Technologies has announced the release of LTU-Finder v. 3.0, a tool for image and video recognition in the field of computer forensics. LTU-Finder 3.0 was unveiled at Guidance Software’s Computer and Enterprise Investigations Conference (CEIC) in Las Vegas, Nevada.

Microsoft slowly seals its lips about its police toolkit

To put a lid on bloggers’ speculation about police getting “backdoors” to Windows security, Microsoft is starting to hush up on the subject. In an e-mail to BetaNews on Friday, a spokesperson described COFEE as a “customizable framework.” Despite releasing

OU tackles computer forensics

Fears of corporate espionage, malicious staff and disputed trade deals has led to the Open University’s first course on computer forensics to be heavily oversubscribed. The post-graduate Computer Forensics and Investigations course starts today, and prospective students have been bumped

‘Extreme Porn’ Law Could Criminalise Millions in UK

Almost unreported, the UK Criminal Justice Bill is slowly wending its way toward becoming law. It includes a section (Clause 63) on “extreme pornographic images” that may, or may not, affect a very large proportion of the adult population in

COFEE (Computer Online Forensic Evidence Extractor)

Microsoft has reportedly developed a USB key that allows investigators to extract forensic data from PCs. COFEE (Computer Online Forensic Evidence Extractor) comes in a USB key form factor, and was distributed to a small number of law-enforcement agencies last

New forensic lab opened at the University of Teesside (UK)

A new laboratory for the training of CSIs has been opened at the University of Teesside. The new Digital Evidence Laboratory was opened by Andrew Rennison, the Home Office’s forensic science regulator. Angus Marshall, senior lecturer in forensic science at

4-Day Hacking BootCamp for Investigators

WetStone Technologies, Inc. now has a 4-day, hands-on, BootCamp focused on those investigating malicious software as it pertains to the hacking process. This class is structured with cyber-safe lab environments where students experience various types of cyber weapons and the

Cybercrime takes back seat to brand as CSO priority

Reputational damage is top of mind for information security leaders again. According to a global survey of more than 7,500 security professionals, 71 per cent said that avoiding harm to brand was their top priority, ahead of other hot topics,

Proper Procedures for Preparing Devices for Computer Forensics

Being aware that any action on your part might compromise computer evidence and taking the steps to prevent and prepare will make your computer forensics team more efficient and effective on the job. Data loss, especially, is a common problem