Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Bloggers Held Under New Thailand Computer Crime Law

If you thought Germany’s new computer crime laws were strict, try posting an offensive comment on the Web in Thailand. According to the independent newspaper Prachatai, at least one person is being detained in the Bangkok Remand Prison for crimes

Understanding IM as Evidence

Instant messaging is an increasingly popular medium that’s sometimes an important link in the prosecution’s case. As with every new communication tool, it brings new challenges for criminal procedure. This multilayered technology provides the convenience of e-mail coupled with the

Justice in the Wild Wild Web

The Internet can often seem like a threatening place where users are susceptible to fraud, identity theft and sexual predators, but law enforcement at all levels of government have been attempting to change that perception. “At the turn of the

Digital detectives discern Photoshop fakery

Spotting inconsistencies in pictures is a major aspect for computer forensics. “One helpful aspect of digital files is that they leave records, whether you know it or not,” says Nasir Memon, a computer science professor at Polytechnic University in New

Call for Papers: Small Scale Digital Device Forensics Journal

The SSDD Forensics Journal invites papers for the 2nd issue, which will be published in January 2008. Papers on topics in the areas listed below as well as outstanding papers on other topics related to small scale digital device forensics

Mobile Forensics World 2008 Conference Announced

Mobile Forensics World 2008 Conference May 8-10, 2008Chicago, Illinois, USA An event for Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers of Mobile Forensics Contact Rick @ rick@MobileForensicsWorld.com for details.

IPhone Tantalizes, Frustrates Forensics Experts

Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize. Derrick Donnelly, chief technology officer of Blackbag Technologies, a Silicon Valley-based company specializing in Apple forensic solutions, is tempted

Online Utica College

(Sponsored Review) Utica College, based in Central New York in the United States, provides regionally accredited Bachelor’s and Master’s Degree programs in economic crime investigation, anti-fraud and computer crime control. An independent, private institution founded in 1946 by Syracuse University,

Unit solves crimes electronically

Detective Jonathan Kennedy of the Prince William County Police Department’s Computer Forensics Unit said it’s satisfying to find something that helps put bad guys away. “You do get a little rush when you find what you’re looking for on whatever

Publication of Hachoir project version 1.0

Hachoir is a framework for binary file manipulation: file format recognition, metadata extraction, searching files in any binary stream (forensics), viewing file content with human representation, etc. It’s composed of many components…Programs:· hachoir-metadata: fault tolerant metadata extraction;· hachoir-subfile: search subfiles

CSFA Test Vouchers

CyberSecurity Institute will be giving away five vouchers for the CyberSecurity Forensic Analyst certification. The vouchers will be good through 2008. http://www.cybersecurityforensicanalyst.com/Interested persons need to send the following information to CSFA@cybersecurityinstitute.biz: NameMailing addressAgency/companyYears forensic analysis experience Regards, Steve Hailey

Letting EDD Evidence Speak for Itself

By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and

German Security Professionals in the Mist

German Information Security professionals were hopeful after proposed changes to the UK Computer Misuse Act Police and Justice Act amendments were suspended due to the fact that if certain clauses were enacted, it would effectively make the entire Information Security

Uni to develop computer forensics standards to help cops nab crims

Researchers from the University of South Australia are aiding police in the fight against online crime by developing a set of forensic computing standards. With the help of an Australian Research Council (ARC) grant to the value of $500 000,

The rise of anti-forensics

Forensic investigations start at the end. Think of it: You wouldn’t start using science and technology to establish facts (that’s the dictionary definition of forensics) unless you had some reason to establish facts in the first place. But by that

CSI Dublin: Cyber-criminals watch out

Digital forensics is changing the way crimes are investigated and it’s also being used by businesses looking to clamp down on unpleasant or illegal staff behaviour. Detective sergeant John Finan admits to watching the occasional episode of CSI and what