Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Hero Image

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

LTU Technologies Releases Image-Seeker for Encase

LTU Technologies announced today the release of LTU Image-Seeker for Encase® (ISE), an integration enhancing image analysis capabilities for the computer forensics tool used by law enforcement and government investigators. Delivered as a plug-in for the industry-standard Encase® platform, ISE

Trends in Digital Forensics

Digital forensics has been forced to change. In the past, when someone was suspected of a crime or behavior that was in violation of corporate policy, the typical process would be to seize the hard drive after hours, take a

Policing Employees’ Online Access at Work

Once an employee is suspected of abusing workplace technology and an investigation begins, the question becomes: How does the company ensure that it has a solid case and can withstand assertions of liability against the company by the employee or

Digital Evidencing In India: A Techno-Legal Perspective

The aim of this article is to analyse the existing legal position regarding collection, analysis and use of cyber evidence in India. The same is an essential part of cyber law in India as computer forensics and cyber law in

SDFOST – Call for Papers

The First International Workshop on Spoofing, Digital Forensics and Open Source Tools (SDFOST), in conjunction with ARES-2007 – The Second International Conference on Availability, Reliability and Security The conference will be held at the Vienna University of Technology (TU) in

Technology experts call new US law burdensome

Three technology experts testified Monday that a new federal law’s restrictions on access to evidence in CP cases would discourage them from working for defendants in such cases… More (dailypress.com)

APWG & NCFS Establish First Electronic Crime Research Conference

The eCrime Researchers Summit in Orlando sponsored by the Anti-Phishing Working Group (APWG) and the National Center for Forensic Science (NCFS) next month will feature some of the most advanced applied research into electronic crime technology ever assembled in a

Making e-crime mainstream

In the words of the Metropolitan Police, computer crime needs to be ‘mainstreamed’ – brought into the law enforcement fold instead of being seen as something different. It would be a fair analogy to say that the situation is similar

Northumbria University starts work on Computer Forensics

Northumbria University has joined forces with IT security firm Sapphire in a collaboration to share knowledge and expertise and develop the North East UK as a hub for computer forensic specialists. Sapphire provides clients with a range of computer forensics

WinHex & X-Ways Forensics 13.5 released

WHAT’S NEW IN V13.5? When searching for keywords and you are not interested in each and every search hit, but merely in a list of files that contain at least one the specified keywords, the logical search now allows you

Ireland to host Europe-wide cyber crime police training

Ireland will play host to international cyber crime training events for European law enforcement officers at the Garda College in Templemore, siliconrepublic.com has learned. According to Detective Inspector Paul Gillen, who is project manager of the programme, the training courses

The profit motives of cyber criminals

Following the 2006 International Virus Bulletin Conference, Kelly Martin takes a look at the profit motives of the cyber criminals behind modern viruses, targeted trojans, phishing scams and botnet attacks that are stealing millions from organizations and individuals… More (SecurityFocus)

Digital Trail Helps Lead To Terror Hoax Suspect

A federal prosecutor says computer forensics played a “critical role” in the investigation that led to the arrest of a Wisconsin man in connection with the fake terrorist threat against football stadiums… More (InformationWeek)

Data recovery experts cleaning up

THE popularity of digital cameras and the growth in portable storage is driving demand for data recovery services, with firms charging up to $3500 to pull data from fried drives. The recovery sector – traditionally serving small businesses that lose