Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Making Computer Crime Sexy

This year in the movie “Firewall,” Harrison Ford made security engineers into heroes when he portrayed Jack Stanfield, a banking brainiac whose firewall system becomes a sticking point for a gang of ruthless baddies. Ford gets told to transfer $100

Technalign Releases Linux Based Computer Forensics Systems

Technalign announced the new release of Frontier Forensics SECS (Secured Evidence Collection System). The new tool replaces Version XI and continues to use MEPIS Linux as the operating system base. The new SECS product will be available via Forensic Computers

New version of libewf released

A new version of libewf has been made available, with better error handling. There is basic EWF-L01 (logical evidence file) support in there, but L01 file support has been disabled because it is still experimental. The library contains no interface

Purdue Researchers Receive Funding For Digital Forensics

Two professors in Purdue University’s College of Technology who research digital forensics recently received grants to fund projects that will make it easier for law enforcement officials to gather and evaluate potentially illegal pictures, documents or information from computers, cell

Presenting digital evidence to court

When bringing an offence committed involving a digital device such as a computer before the criminal court system of England and Wales a strategy must be drawn up by the prosecution to prove beyond all reasonable doubt that the defendant

Preserving Data in the Wake of Amended Rule 37(f)

Rule 37(f), one of the key changes in the upcoming electronic-data discovery (EDD) amendments to the Federal Rules of Civil Procedure, helps define what steps a party must take to preserve potentially discoverable electronically stored information (ESI) within an electronic

Met Police investigates US hack on UK users

London’s Metropolitan Police Computer Crime Unit (CCU) has launched an investigation into how data containing personal information from the UK ended up on a computer in the US. “We believe the data has been stolen with the use of a

Authorizing devices could be worth a look

A recent study of Justice Department prosecutions suggests that authentication of devices—not just people—when logging into privileged accounts could go a long way toward securing sensitive data. Most of the cases reviewed involved outsiders who logged on with stolen identifications

Defiance College, Ohio, offers computer forensics major

Barrel-chested and bearded, Gregg Gunsch stood before the class with the ramrod bearing of a soldier, rather than a computer geek. “We are expecting our information systems to be under attack,” said Mr. Gunsch, an associate professor at Defiance College.

Small Scale Digital Device Forensics Journal – Call for Papers

SSDD Forensics Journal Call For Papers The SSDD Forensics Journal (ssddfj.org) invites papers for the premier issue, which will be published in February 2007. Papers on topics in the areas listed below as well as outstanding papers on other topics

Local police struggling to deal with cyber crime

While most local police departments are dealing with reports of cyber crimes, the vast majority say they lack money and training needed to combat it, according to a newly released survey. Cyber threats and crimes against children, identity theft and

Computer Forensics: The New Fingerprinting

Tony Pallone is an examiner in the Pittsburgh FBI office’s computer forensics lab. The operation is a small-scale version of the FBI’s 10 multiagency Regional Computer Forensics Laboratories (RCFLs); two more are slated to open this year. The FBI provides

U.S. Joins Council of Europe Convention on Computer-Based Crime

The United States is now a party to the Council of Europe (COE) Convention on Cybercrime, the only multilateral treaty that specifically addresses the problem of computer-related crime and electronic evidence gathering, the White House has announced. The convention requires

Computer crime laws worry security pros

Moves by several European countries to tighten laws against computer hacking worry security professionals, who often use the same tools as hackers but for legitimate purposes. The U.K. and Germany are among the countries that are considering revisions to their

CALL FOR PAPERS: Journal of Digital Forensics, Security, and Law

Journal of Digital Forensics, Security, and Lawhttp://www.jdfsl.org/Special Issue on International & Comparative Digital Forensics, Security and LawCALL FOR PAPERS – Submission Deadline: 31 January 2007The globalization of business relations, and the occurrence of international frauds, brought the frequent occurrence of

Northwest Vista creates new computer forensic technology degree plan

Northwest Vista College (San Antonio, US) has launched a new associate’s degree program designed to help prepare students for a career in computer forensics. Students who pursue an associate of applied science degree in computer forensics technology will learn information