Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Call for Papers: Small Scale Digital Device Forensics Journal

The SSDD Forensics Journal invites papers for the 2nd issue, which will be published in January 2008. Papers on topics in the areas listed below as well as outstanding papers on other topics related to small scale digital device forensics

Mobile Forensics World 2008 Conference Announced

Mobile Forensics World 2008 Conference May 8-10, 2008Chicago, Illinois, USA An event for Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers of Mobile Forensics Contact Rick @ rick@MobileForensicsWorld.com for details.

IPhone Tantalizes, Frustrates Forensics Experts

Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize. Derrick Donnelly, chief technology officer of Blackbag Technologies, a Silicon Valley-based company specializing in Apple forensic solutions, is tempted

Online Utica College

(Sponsored Review) Utica College, based in Central New York in the United States, provides regionally accredited Bachelor’s and Master’s Degree programs in economic crime investigation, anti-fraud and computer crime control. An independent, private institution founded in 1946 by Syracuse University,

Unit solves crimes electronically

Detective Jonathan Kennedy of the Prince William County Police Department’s Computer Forensics Unit said it’s satisfying to find something that helps put bad guys away. “You do get a little rush when you find what you’re looking for on whatever

Publication of Hachoir project version 1.0

Hachoir is a framework for binary file manipulation: file format recognition, metadata extraction, searching files in any binary stream (forensics), viewing file content with human representation, etc. It’s composed of many components…Programs:· hachoir-metadata: fault tolerant metadata extraction;· hachoir-subfile: search subfiles

CSFA Test Vouchers

CyberSecurity Institute will be giving away five vouchers for the CyberSecurity Forensic Analyst certification. The vouchers will be good through 2008. http://www.cybersecurityforensicanalyst.com/Interested persons need to send the following information to CSFA@cybersecurityinstitute.biz: NameMailing addressAgency/companyYears forensic analysis experience Regards, Steve Hailey

Letting EDD Evidence Speak for Itself

By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and

German Security Professionals in the Mist

German Information Security professionals were hopeful after proposed changes to the UK Computer Misuse Act Police and Justice Act amendments were suspended due to the fact that if certain clauses were enacted, it would effectively make the entire Information Security

Uni to develop computer forensics standards to help cops nab crims

Researchers from the University of South Australia are aiding police in the fight against online crime by developing a set of forensic computing standards. With the help of an Australian Research Council (ARC) grant to the value of $500 000,

The rise of anti-forensics

Forensic investigations start at the end. Think of it: You wouldn’t start using science and technology to establish facts (that’s the dictionary definition of forensics) unless you had some reason to establish facts in the first place. But by that

CSI Dublin: Cyber-criminals watch out

Digital forensics is changing the way crimes are investigated and it’s also being used by businesses looking to clamp down on unpleasant or illegal staff behaviour. Detective sergeant John Finan admits to watching the occasional episode of CSI and what

Federal Prosecutor: Cybercrime Is Funding Organized Crime

For months now, the feds have said organized crime was moving into the realm of cybercrime, using hackers to run scams and break into systems. But Assistant U.S. Attorney Erez Liebermann, chief of the computer hacking and intellectual property section

To a new kind of sleuth, phones leave a rich trail

Dale Hanson patrolled Minneapolis’ North Side before his policing career took a major turn off the streets and he became the department’s first full-time computer forensic specialist in June 2005. The job quickly morphed into the relatively unknown territory of

Thailand’s anti-computer crime law takes effect

Information and Communications Technology Minister Sitthichai Pookaiyaudom said the law, implemented for the first time on Wednesday, to counter cyber crimes, will not affect the public’s use of computers or Internet services and was only designed to combat crimes involving

Vista makes computer search easier…for the law

An American Bar Journal eColumn article brings us relevant revelations about Vista’s improved ability to provide evidence for court. Innovations within Vista apparently make it far easier to find evidence on PCs. Chief among those are Shadow Copy, Transactional NTFS