Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

E-mails as Court Evidence: Be ready to Produce & Afford

United States Federal Courts are reluctant to accept high-computer-forensic costs as a reason to waive production of electronic data. When electronic data like corporate e-mails cannot be easily produced, computer forensic experts are required. Services rendered by computer forensic experts

Computer Crime Investigator Wanted (Tazewell County)

Tazewell County authorities are on the hunt. They’re looking for a computer and financial crimes investigator to coordinate their new computer crime task force. State’s Attorney Stewart Umholtz says he’s received the okay from the Tazewell county board to hire

Starting a Digital Forensics Section

Craig is sitting in his office enjoying a cup of coffee when his telephone rings. He answers and on the line is his boss, George, the laboratory director. George informs Craig that he wants to provide Digital Forensic analysis services

Public and police are finally taking online crime seriously

Recently, I attended a barbecue at a friend’s house in north London, where another friend was trying to fix his laptop. “Do you realise that there are three people, right now, using your wireless broadband?” the computer expert asked my

Defining Digital Forensics

Wouldn’t it be great if we could just look up the term “digital forensics” in the dictionary? Unfortunately, as you and others have found, it is not that easy. Even better, wouldn’t it be great if we could sort out

Forensics: New Options for the Enterprise

If you think finding out who did what with your data always means calling in high-priced spooks armed with arcane software, think again. The trend is toward placing the power to handle investigations in the hands of enterprises themselves. Why?

On the Trail of Digital Secrets

From prominent murder cases to lowly divorce proceedings, the e-mail messages that people send and the Web sites they view can and will be used in court. The people who unearth this data and make it usable in the courtroom

Businesses call for police cyber crime unit

UK businesses are calling for a dedicated national police unit to deal with the growing computer crime threat posed by hackers and international gangs of criminals. Organisations must currently report any attacks on their network or data to local police

Standards and Controls in Computer Forensics

The use of appropriate standards and controls is essential during forensic analyses if the resulting conclusions are to be considered scientific and used for prosecutorial purposes. No forensic examiner can rightly state that he or she provided quality analytical results

Forensic Analysis of Computer Programs

The practice of Reverse Engineering of computer programs has grown out of its obscure and nefarious origins and entered the realm of Computer Forensics. On an increasing basis Computer Forensic Examiners are encountering critical evidence of sophisticated cyber crimes contained

Indiana State Police Forensics Field Triage Program a Success

Approximately two years ago, the Indiana State Police instituted a unique program in which examiners conduct on scene computer forensics. The goal of the Computer Forensics Field Triage program is to utilize departmental resources efficiently to improve cyber crime investigations

WinHex, X-Ways Forensics, X-Ways Investigator 14.4 released

WHAT’S NEW? * Ability to extract e-mail messages and attachments from AOL PFC files. (forensic license only) Note that if these files have no extension, only a signature check will identify them as PFC files. * Can now extract embedded

Computer cop receives award

The New Britain police department’s computer crime expert was stumped. The state police’s lab couldn’t help. Even the FBI didn’t have the answer. But Lt. James Wardwell kept searching, trying to find some way to infiltrate a stack of erased

NZ IT practices inadequate for forensic evidence

The second annual New Zealand Computer Crime and Security Survey has revealed New Zealand organisations are ill-equipped to preserve computer forensic evidence. The University of Otago conducted survey – which aims to raise the level of security awareness and determine

Court systems ill-equipped to understand e-crime

Computer forensics investigator Bryan Sartin says court systems are ill-equipped to understand e-crime, even at a basic level. Here he describes a recent case of a hacker who stole customer information from a retail system. The case didn’t play out

Mobile Phone Forensic Course Available From Guidance Software

Guidance Software, Inc. today announced the availability of its introductory level mobile phone forensic course. The hands-on course introduces investigators to Neutrino™, the company’s mobile phone acquisition tool, and demonstrates how the product is used to perform comprehensive analysis and