Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

UK takes lead in e-crime portal

UK computer security experts are designing a web portal to gather more precise statistics on Europeans victimised by internet crime, an area that remains difficult for collecting accurate data. The portal will be part of Victims of Internet Crime Europe,

Digital forensics lack standards

Court cases involving digital evidence are at risk of collapsing because some police forces fail to check the security of computer forensics suppliers. A Computing investigation has revealed that while some firms providing conventional forensics services must attain an ISO

Forensic tools 2007

Corporate needs driven by regulatory necessity and incident management are beginning to call the shots in the forensic arena, reports Peter Stephenson. This month we looked at a wide variety of digital forensic tools. This category has been growing rapidly,

Search for e-mails in U.S. attorney firings may be fruitless

When questioning the White House claim that some sensitive e-mails from officials there might have disappeared for good, Democrats can cite any number of high-profile computer users who once thought the same — from Oliver North to Bill Gates. “You

Tony Soprano’s laptop

Tony Soprano’s dislike of computers is well-known, but in 2007, it’s hard to keep a business running without one. (Another argument for creator David Chase ending the show after five seasons, but too late now.) Tony knows that yesterday’s bookie

Sleuthkit 2.08 Released

The 2.08 release of TSK is out. It contains several minor bug fixes andmany internal updates. This version will cleanly compile on Cygwin andhfind is now available on Win32. http://www.sleuthkit.org/sleuthkit/download.php

Forensics firm recovers evidence from computers, analyzes audio

Much like his counterparts on TV’s “CSI” or “Law & Order,” Darren Miller ferrets out forensic information in pursuit of justice. But unlike his fictional colleagues who work for prosecutors, Miller and his ISA Forensics team work mostly with defense

The need for expert witnesses in computer forensics

Last month saw the downfall of Gene Morrison. A conman who masqueraded as a forensic scientist and gave evidence in more than 700 police cases, some of them involving rape and drink-driving, Morrison, 48, of Hyde, Tameside, was found guilty

How To Come Back From A CyberAttack

Are you prepared to deal with a cyber attack? Most companies are not. In this month’s computer forensics column, we’ll offer a peek at some real-life situations, and as well as a run down on the steps you should follow

So You Want to Be a Digital Detective?

The man was careful to cover his tracks, erasing e-mail messages and other incriminating documents. He sent especially sensitive messages to his prospective employer via a Web-based e-mail service, not the corporate e-mail system of his current employer. And with

Scientists announce incredible data recovery breakthrough

Leading scientists have announced a new technique for data recovery which is set to revolutionize the way forensic examiners uncover hidden data. Instead of creating a bit-level image of a hard disk using expensive hardware, researchers have discovered that ordinary

U.S. Leads World in Computer Crime

The United States generates more malicious computer activity than any other country, and sophisticated hackers worldwide are banding together in highly efficient crime rings, according to a new report. Researchers at Cupertino-based Symantec Corp. also found that fierce competition in

LTU and Microsoft Join Forces to Catch Cyber-Criminals

To turbo-charge child-abuse investigations, LTU Technologies has combined two investigative tools that will provide enhanced resources for victim identification and rescue. In response to a request by the Italian Police, the Child Exploitation Tracking System (CETS) and LTU’s Image-Seeker have

WinHex, X-Ways Forensics, X-Ways Investigator 13.9 released

WHAT’S NEW? * Forensic licenses only: Ability to open remote network drives at a logical level, if a drive letter has been assigned locally. The directory browser, File mode, Preview mode, Gallery mode, and Calendar mode are all available. A

Tracking terrorists with click of a mouse

Tucked away in a squat, 1980s-era office park halfway between Washington and Baltimore, 200 digital detectives are scouring the hard drives, MP3 players and compact discs seized from terrorist hide-outs in search of links and clues to their next plans