Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

Organized crime eyes online gamers

Online gamers are thought to be a new target for fraudsters and organized crime, according to one industry specialist. Microsoft engineer Dave Weinstein claims that hackers can use Trojan horses to install keyloggers on systems to gain access to a

U.K. Spammer Sentenced

A U.K. teen was sentenced to a two-month curfew after pleading guilty to sending about five million spam e-mails. The 18-year-old admitted that this act constituted a violation of Section 3 of the Computer Misuse Act. A U.K. insurance firm,

Downloading: the new work theft

Until now, stealing from the company usually involved the odd piece of stationery or personal photocopying. But a conviction for downloading on the company computer has highlighted a new type of employment theft. Downloading files on the company computer might

Microsoft offers one-click police report via IM

Users of Windows Live Messenger or MSN Messenger in the United Kingdom can click a new button in the chat application to contact police with reports of suspicious behavior and instances of inappropriate sexual conduct online… More (news.com)

DOD eyes new forensics

The Defense Department issued a challenge to coders in an effort to get help in computer forensics and data analysis. Contestants will compete to uncover and recover digital data that’s been hidden or damaged. “They will be dealing with all

Version 2.0 of StegAlyzerAS and StegAlyzerSS released

Backbone Security’s Steganography Analysis and Research Center (SARC) has released version 2.0 of StegAlyzerAS (Steganography Analyzer Artifact Scanner) and StegAlyzerSS (Steganography Analyzer Signature Scanner). The new versions have significant new improvements including the ability to scan images of seized storage

NIST’s goal: Keep digital evidence fresh

Scientists at the National Institute of Standards and Technology are known for sweating the nitty-gritty details of dull but vital standards for everything from bulletproof vests to medical measurement devices and IT encryption. And now, agency experts are bringing the

E-mail first step on trail

The investigation that led law enforcement to John Mark Karr can be traced to a single e-mail, sent some four years ago… More (Rocky Mountain News) While the FBI’s Atlanta spokesman, Stephen Emmett, declined to elaborate on the FBI’s role,

Computers play large role in solving cases

Computers can contain a wealth of evidence, making them valuable resources for law enforcement, government officials, private companies and the like. That’s even if the user thinks incriminating files have been deleted, or if nothing on the hard drive is

Cost of computer crime in NZ

New Zealand organisations spend on average about half a million dollars annually fighting computer crime within their organisations, according to a new University of Otago survey… More (Scoop)

WinHex & X-Ways Forensics 13.2 released

WHAT’S NEW IN V13.2? * There are new (optional) quick filter buttons in the directory browser column headers that allow to activate and modify dynamic filter settings more instantly. * The indexing algorithm was revised. The index files are now

Cybercrime Treaty: Effective Law Enforcement?

The U.S. Senate recently approved an international treaty designed to combat computer crime. The treaty has been touted by Senate leaders as enhancing the U.S. ability to cooperate with foreign governments in fighting terrorism, computer hacking, money laundering and child

UK police decryption powers ‘flawed’

The government faces criticism over plans to give police powers to make suspects produce readable copies of encrypted computer evidence.The police say the powers are needed because criminals are increasingly using encryption to hide evidence. They estimate that currently there

An introduction to Computer Forensics

E-business is, by definition, technology-dependent. With the increased use of technology it is often assumed that failures are directly related to IT. In actual fact, a significant number of failures or incidents are the result of unauthorised acts by employees

Live forensics

Computer forensics, much like more traditional forensics, is an art as much as a science. Its practice demands a detective’s intuition and a technician’s know-how. Only in this case, it’s to discern digital clues from the inner workings of electronic