Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

And you thought RAID was a challenge…

What began as a home improvement project culminated in a system called Cleversafe. For companies and government agencies trying to secure networked data, it offers a simple way to store digital documents and other files in slices that can be

Organized crime eyes online gamers

Online gamers are thought to be a new target for fraudsters and organized crime, according to one industry specialist. Microsoft engineer Dave Weinstein claims that hackers can use Trojan horses to install keyloggers on systems to gain access to a

U.K. Spammer Sentenced

A U.K. teen was sentenced to a two-month curfew after pleading guilty to sending about five million spam e-mails. The 18-year-old admitted that this act constituted a violation of Section 3 of the Computer Misuse Act. A U.K. insurance firm,

Downloading: the new work theft

Until now, stealing from the company usually involved the odd piece of stationery or personal photocopying. But a conviction for downloading on the company computer has highlighted a new type of employment theft. Downloading files on the company computer might

Microsoft offers one-click police report via IM

Users of Windows Live Messenger or MSN Messenger in the United Kingdom can click a new button in the chat application to contact police with reports of suspicious behavior and instances of inappropriate sexual conduct online… More (news.com)

DOD eyes new forensics

The Defense Department issued a challenge to coders in an effort to get help in computer forensics and data analysis. Contestants will compete to uncover and recover digital data that’s been hidden or damaged. “They will be dealing with all

Version 2.0 of StegAlyzerAS and StegAlyzerSS released

Backbone Security’s Steganography Analysis and Research Center (SARC) has released version 2.0 of StegAlyzerAS (Steganography Analyzer Artifact Scanner) and StegAlyzerSS (Steganography Analyzer Signature Scanner). The new versions have significant new improvements including the ability to scan images of seized storage

NIST’s goal: Keep digital evidence fresh

Scientists at the National Institute of Standards and Technology are known for sweating the nitty-gritty details of dull but vital standards for everything from bulletproof vests to medical measurement devices and IT encryption. And now, agency experts are bringing the

E-mail first step on trail

The investigation that led law enforcement to John Mark Karr can be traced to a single e-mail, sent some four years ago… More (Rocky Mountain News) While the FBI’s Atlanta spokesman, Stephen Emmett, declined to elaborate on the FBI’s role,

Computers play large role in solving cases

Computers can contain a wealth of evidence, making them valuable resources for law enforcement, government officials, private companies and the like. That’s even if the user thinks incriminating files have been deleted, or if nothing on the hard drive is

Cost of computer crime in NZ

New Zealand organisations spend on average about half a million dollars annually fighting computer crime within their organisations, according to a new University of Otago survey… More (Scoop)

WinHex & X-Ways Forensics 13.2 released

WHAT’S NEW IN V13.2? * There are new (optional) quick filter buttons in the directory browser column headers that allow to activate and modify dynamic filter settings more instantly. * The indexing algorithm was revised. The index files are now

Cybercrime Treaty: Effective Law Enforcement?

The U.S. Senate recently approved an international treaty designed to combat computer crime. The treaty has been touted by Senate leaders as enhancing the U.S. ability to cooperate with foreign governments in fighting terrorism, computer hacking, money laundering and child

UK police decryption powers ‘flawed’

The government faces criticism over plans to give police powers to make suspects produce readable copies of encrypted computer evidence.The police say the powers are needed because criminals are increasingly using encryption to hide evidence. They estimate that currently there

An introduction to Computer Forensics

E-business is, by definition, technology-dependent. With the increased use of technology it is often assumed that failures are directly related to IT. In actual fact, a significant number of failures or incidents are the result of unauthorised acts by employees