The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

CyberSpeak September 3, 2006

Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime… "This episode we have Keith Jones, Director of Computer Forensics, Incident Response, and Litigation Support for MANDIANT who recently testified as an expert witness in the UBS

Digital forensic tool to curb web abuse

An Information technology expert has designed a digital forensic tool that can home in on workplace computers used for criminal activity or deliberate misuse of the Internet. Bennie Fei, a masters student at the University of Pretoria, warned that there

Net browser promises private surf

A web browser has been released that promises total privacy for its users. Browzar, as it is known, automatically deletes all traces of the pages a person has visited, and the terms that they have searched for on the web…

Books give in-depth look into cybercrime

From M. E. Kabay’s newsletter at Network World… The fall 2006 semester has begun at Norwich University and I’ll be teaching “Cybercrime and Cyberlaw” with my colleague Adjunct Professor Julie Tower-Pierce. Readers of this column may be interested in two

Cyber Crime: The Wild West, Online

Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. While most of us use computers to work, shop, play games, book vacations, or do banking transactions, a new breed of criminal uses the same

CyberSpeak August 27, 2006

Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime… "Back from vacation. This week we talk with Special Agent David Farquhar from the Federal Bureau of Investigations about his recent successful botnet case in Seattle Washington.

KoreLogic Wins Digital Forensic Research Workshop Contest

Klayton Monroe and Jay Smith of KoreLogic Security were key members of the team announced as winners of the 2006 File Carving Challenge at the 6th Annual Digital Forensic Research Workshop (DFRWS). Challenge participants were asked to develop new tools

Spanish cybercrime on the rise

Online fraud in Spain experienced a year-on-year growth of 50 percent in the first four months of 2006, the Computer Crime Research Center reports. Although cybercrime may not be viewed as a pressing concern in Spain, according to some sources,

Cops follow texting trail

Text messages, archived in cell phones, are now among the routine array of clues that detectives seek: At the very onset of an investigation, they can help finger a suspect quickly. In cases of missing or abducted people, they can

CY4OR invest in Advanced Forensic Audio & Visual Suite

Computer Forensic company CY4OR has increased its capacity to analyse audio and visual footage in response to a weighty demand for the service. The analysis suite has been developed and expanded to include the most comprehensive technology available on the

2007 Conference on Digital Forensics, Security and Law

The ADFSL 2007 Conference on Digital Forensics, Security and Law will beheld in Arlington, Virginia USA on April 18-20, 2007 and is calling forpapers and proposals in, or related to, the following areas. 1) Digital forensics curriculum2) Cyber law curriculum3)

DC3 Digital Forensics Challenge

Do you or someone you know have what it takes to meet our Challenge? The Department of Defense Cyber Crime Center (DC3) has created it’s first Digital Forensics Challenge. This Challenge is open to any and all U.S. citizens in

And you thought RAID was a challenge…

What began as a home improvement project culminated in a system called Cleversafe. For companies and government agencies trying to secure networked data, it offers a simple way to store digital documents and other files in slices that can be

Organized crime eyes online gamers

Online gamers are thought to be a new target for fraudsters and organized crime, according to one industry specialist. Microsoft engineer Dave Weinstein claims that hackers can use Trojan horses to install keyloggers on systems to gain access to a

U.K. Spammer Sentenced

A U.K. teen was sentenced to a two-month curfew after pleading guilty to sending about five million spam e-mails. The 18-year-old admitted that this act constituted a violation of Section 3 of the Computer Misuse Act. A U.K. insurance firm,

Downloading: the new work theft

Until now, stealing from the company usually involved the odd piece of stationery or personal photocopying. But a conviction for downloading on the company computer has highlighted a new type of employment theft. Downloading files on the company computer might