MD-Series Release Note Highlights : 2024 Q3 Review

Hero Image

GMDSOFT’s Q3 release for the MD-Series introduces key advancements, including enhanced device and app support, improved image analysis, VoIP call analysis, drone data extraction, and AI-driven video tools....

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Gernot Schmied, an IT civil engineer and court expert, reviews Amped Authenticate, a product from Amped Software designed to uncover the processing history of digital images and videos....read more

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11! Enjoy simplified Android FFS support, dark mode for XRY, streamlined Project VIC grading in XAMN, and improved file permissions in XEC. Plus, MSAB Kiosks and Tablets now support BitLocker and Wi-Fi....read more

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer v.1.6 is now available. Capture remote disk dumps, extract WhatsApp data via Wi-Fi, and use new passcode brute force tools. The update also includes speech-to-text in 50+ languages, enhancing remote investigations....read more

Step-by-Step Incident Response

When a critical enterprise server is breached, a well thought-out incident response plan will help you contain damage, speed up service restoration, and collect forensic information. If you have reason to believe that a system has been compromised, either by

Another Look at Log Files

Marcus Ranum architected the first commercial firewall in 1990. He founded Network Flight Recorder Security, the company responsible for the first network forensics tool. And last summer at the Usenix conference, during a course he was teaching on log file

RCFL network plans expansion in 2005

WASHINGTON, D.C.- The FBI is poised to expand the country’s premier computer forensics laboratory network starting in May, according to Assistant Director Kerry E. Haynes, Operational Technology Division. Additional Regional Computer Forensic Laboratories (RCFLs) are scheduled to open in Portland,

UK centre to tackle net paedophiles planned

A unit to protect children in the UK from internet paedophiles is being set up by the Home Office. About 100 staff, including police and child welfare experts will join the Centre for Child Protection on the Internet next April.

Court helps Ryanair trace staff pilots who criticised on-line

An Irish judge has awarded Ryanair an injunction to prevent the destruction of web site user data in a court battle over the identities of its pilots who criticised the airline’s working practices in an on-line forum for Ryanair pilots,

Microsoft fighting cybercrime

Microsoft is developing analytical tools to help international law enforcement agencies track and fight cybercrime. Microsoft unveiled the tools development program at the kickoff on Wednesday of three days of technical training for Australian law enforcement agencies. The Forensic Computing

Aussie Feds target computer forensics

Australia’s hi-tech crime squad has vowed to change the perception of the internet as an anonymous haven to one where users are not as nameless as they might think. At a three-day computer forensics workshop in Canberra Federal Police Australian

Net fingerprints combat attacks

Eighty large net service firms have switched on software to spot and stop net attacks automatically. The system creates digital fingerprints of ongoing incidents that are sent to every network affected. Firms involved in the smart sensing system believe it

Jeff Weise’s e-mail trail led authorities to Jourdain

It’s hard to cover your tracks on your computer. Deleted files aren’t immediately deleted. And software programs on most PCs keep all sorts of data trails, recording the Web sites you visit, the pictures you look at, the e-mails you

Online CP investigation costs UK police £15m

The cost of forensically examining the computers seized during the UK police’s Operation Ore investigation into online CP will total £15m, according to the National Crime Squad (NCS). Operation Ore was launched after the FBI smashed an illegal CP ring

Expert rejects Lundy evidence

A computer forensics expert who has spent up to 400 hours examining evidence in the Mark Lundy murder case says he has ruled out police claims that Lundy manipulated a computer clock to give himself an alibi. The Crown at

Can computers survive cross-examination?

Between my fingers typing these words and the Word application which records them there is a huge range of different programs, not all of which I know intimately. If even a simple document such as this is potentially affected by

UK MP to raise bill to boost computer crime laws

Derek Wyatt, chairman of the All Party Internet Group, is to raise a 10 minute rule bill in the Commons next month calling for the Computer Misuse Act to be strengthened. The move follows a campaign by Computer Weekly, businesses

Super Resolution: Making the invisible visible

Intel is developing a technology that promises to uncover hidden information in digital images and videos and create output files of significantly higher resolution and quality. “Super Resolution” (SR) consumes enormous computing resources, but is on track to reduce the

Judge in Jackson trial: Computer images inadmissible

Computers seized from Michael Jackson’s bedroom and containing stored images of naked women from adult Web sites are not admissible at the singer’s child-molestation trial, Superior Court Judge Rodney Melville ruled Wednesday. Melville said he barred the materials because it