Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Fighting crime, byte by byte

Charleston’s digital detectives unearth fragile evidence, and they sift through mind-boggling amounts of data to get to it. Deleted cell phone text messages, photos hidden in strings of numeric code, logs of Web addresses. All could provide breakthroughs in a

Lenovo Equips ThinkPad Notebooks With Disk Encryption

Lenovo announced this week that it is arming its ThinkPad notebooks with the ability to fully encrypt the hard drive to bolster security. Lenovo’s latest technology move links fingerprint identity to the active directory. The fingerprint swipe recognizes 30 data

New center to help Kentucky police in crimes involving computers

A new digital forensics center opened Thursday in Louisville, a move Kentucky law enforcement said will help them catch and prosecute criminals. The Kentucky Regional Computer Forensics Laboratory will serve as a central place for law enforcement officers to seek

E-discovery Sanctions are Turning Unforgiving

As e-discovery becomes the most common method to collect evidence, court sanctions for evidence tampering get unforgiving. In a recent decision, a Massachusetts District court granted summary judgment for defendant and allowed defendant to recover costs and attorney fees when

Making Computer Crime Sexy

This year in the movie “Firewall,” Harrison Ford made security engineers into heroes when he portrayed Jack Stanfield, a banking brainiac whose firewall system becomes a sticking point for a gang of ruthless baddies. Ford gets told to transfer $100

Technalign Releases Linux Based Computer Forensics Systems

Technalign announced the new release of Frontier Forensics SECS (Secured Evidence Collection System). The new tool replaces Version XI and continues to use MEPIS Linux as the operating system base. The new SECS product will be available via Forensic Computers

New version of libewf released

A new version of libewf has been made available, with better error handling. There is basic EWF-L01 (logical evidence file) support in there, but L01 file support has been disabled because it is still experimental. The library contains no interface

Purdue Researchers Receive Funding For Digital Forensics

Two professors in Purdue University’s College of Technology who research digital forensics recently received grants to fund projects that will make it easier for law enforcement officials to gather and evaluate potentially illegal pictures, documents or information from computers, cell

Presenting digital evidence to court

When bringing an offence committed involving a digital device such as a computer before the criminal court system of England and Wales a strategy must be drawn up by the prosecution to prove beyond all reasonable doubt that the defendant

Preserving Data in the Wake of Amended Rule 37(f)

Rule 37(f), one of the key changes in the upcoming electronic-data discovery (EDD) amendments to the Federal Rules of Civil Procedure, helps define what steps a party must take to preserve potentially discoverable electronically stored information (ESI) within an electronic

Met Police investigates US hack on UK users

London’s Metropolitan Police Computer Crime Unit (CCU) has launched an investigation into how data containing personal information from the UK ended up on a computer in the US. “We believe the data has been stolen with the use of a

Authorizing devices could be worth a look

A recent study of Justice Department prosecutions suggests that authentication of devices—not just people—when logging into privileged accounts could go a long way toward securing sensitive data. Most of the cases reviewed involved outsiders who logged on with stolen identifications

Defiance College, Ohio, offers computer forensics major

Barrel-chested and bearded, Gregg Gunsch stood before the class with the ramrod bearing of a soldier, rather than a computer geek. “We are expecting our information systems to be under attack,” said Mr. Gunsch, an associate professor at Defiance College.

Small Scale Digital Device Forensics Journal – Call for Papers

SSDD Forensics Journal Call For Papers The SSDD Forensics Journal (ssddfj.org) invites papers for the premier issue, which will be published in February 2007. Papers on topics in the areas listed below as well as outstanding papers on other topics

Local police struggling to deal with cyber crime

While most local police departments are dealing with reports of cyber crimes, the vast majority say they lack money and training needed to combat it, according to a newly released survey. Cyber threats and crimes against children, identity theft and

Computer Forensics: The New Fingerprinting

Tony Pallone is an examiner in the Pittsburgh FBI office’s computer forensics lab. The operation is a small-scale version of the FBI’s 10 multiagency Regional Computer Forensics Laboratories (RCFLs); two more are slated to open this year. The FBI provides