Digital Forensics Jobs Round-Up, August 04 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Understanding IM as Evidence

Instant messaging is an increasingly popular medium that’s sometimes an important link in the prosecution’s case. As with every new communication tool, it brings new challenges for criminal procedure. This multilayered technology provides the convenience of e-mail coupled with the

Justice in the Wild Wild Web

The Internet can often seem like a threatening place where users are susceptible to fraud, identity theft and sexual predators, but law enforcement at all levels of government have been attempting to change that perception. “At the turn of the

Digital detectives discern Photoshop fakery

Spotting inconsistencies in pictures is a major aspect for computer forensics. “One helpful aspect of digital files is that they leave records, whether you know it or not,” says Nasir Memon, a computer science professor at Polytechnic University in New

Call for Papers: Small Scale Digital Device Forensics Journal

The SSDD Forensics Journal invites papers for the 2nd issue, which will be published in January 2008. Papers on topics in the areas listed below as well as outstanding papers on other topics related to small scale digital device forensics

Mobile Forensics World 2008 Conference Announced

Mobile Forensics World 2008 Conference May 8-10, 2008Chicago, Illinois, USA An event for Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers of Mobile Forensics Contact Rick @ rick@MobileForensicsWorld.com for details.

IPhone Tantalizes, Frustrates Forensics Experts

Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize. Derrick Donnelly, chief technology officer of Blackbag Technologies, a Silicon Valley-based company specializing in Apple forensic solutions, is tempted

Online Utica College

(Sponsored Review) Utica College, based in Central New York in the United States, provides regionally accredited Bachelor’s and Master’s Degree programs in economic crime investigation, anti-fraud and computer crime control. An independent, private institution founded in 1946 by Syracuse University,

Unit solves crimes electronically

Detective Jonathan Kennedy of the Prince William County Police Department’s Computer Forensics Unit said it’s satisfying to find something that helps put bad guys away. “You do get a little rush when you find what you’re looking for on whatever

Publication of Hachoir project version 1.0

Hachoir is a framework for binary file manipulation: file format recognition, metadata extraction, searching files in any binary stream (forensics), viewing file content with human representation, etc. It’s composed of many components…Programs:· hachoir-metadata: fault tolerant metadata extraction;· hachoir-subfile: search subfiles

CSFA Test Vouchers

CyberSecurity Institute will be giving away five vouchers for the CyberSecurity Forensic Analyst certification. The vouchers will be good through 2008. http://www.cybersecurityforensicanalyst.com/Interested persons need to send the following information to CSFA@cybersecurityinstitute.biz: NameMailing addressAgency/companyYears forensic analysis experience Regards, Steve Hailey

Letting EDD Evidence Speak for Itself

By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and

German Security Professionals in the Mist

German Information Security professionals were hopeful after proposed changes to the UK Computer Misuse Act Police and Justice Act amendments were suspended due to the fact that if certain clauses were enacted, it would effectively make the entire Information Security

Uni to develop computer forensics standards to help cops nab crims

Researchers from the University of South Australia are aiding police in the fight against online crime by developing a set of forensic computing standards. With the help of an Australian Research Council (ARC) grant to the value of $500 000,

The rise of anti-forensics

Forensic investigations start at the end. Think of it: You wouldn’t start using science and technology to establish facts (that’s the dictionary definition of forensics) unless you had some reason to establish facts in the first place. But by that

CSI Dublin: Cyber-criminals watch out

Digital forensics is changing the way crimes are investigated and it’s also being used by businesses looking to clamp down on unpleasant or illegal staff behaviour. Detective sergeant John Finan admits to watching the occasional episode of CSI and what

Federal Prosecutor: Cybercrime Is Funding Organized Crime

For months now, the feds have said organized crime was moving into the realm of cybercrime, using hackers to run scams and break into systems. But Assistant U.S. Attorney Erez Liebermann, chief of the computer hacking and intellectual property section