Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Call For Papers – Digital Forensics Research Workshop (DRFWS) 2006

Call for Papers The 6th Annual Digital Forensic Research Workshop (DFRWS 2006) August 14-16, 2006 Purdue University Lafayette, Indiana, USA www.dfrws.org dfrws2006 (at) dfrws (dot) org The purpose of this workshop is to bring together researchers,practitioners, and educators interested in

Cyberthreats? Call a digital Sherlock Holmes

When the CEO of a small San Diego publishing company started receiving threatening e-mails from an anonymous address, he had a pretty good idea that someone in the company’s IT department was involved. The CEO called his lawyers, who in

New data deletion software for consumers

Software that its developers claim will completely eliminate sensitive data from hard drives has been developed by Nova Development. Drive Erase Pro is targeted at people who want to ensure a hard drive or memory card is truly blank before

Special agent uses teen talk and computer forensics

Most weekdays, and some weekends and nights, find Special Agent James May sitting in front of a PC in his Detroit office, waiting for some cyberjohn to hit on him. Well, not him exactly, but one of his many teenage

Chasing cyber-crime, one byte at a time

Tom Heflin is the resident surveillance technician and computer forensics expert for the Augusta County Sheriff’s office, the department’s first line of defense against computer-based crimes. His primary job: Cracking open hard drives and electronic media seized by deputies to

Battling the High Tech Crime Wave in Oregon

If your vision of a high tech criminal is a lone hacker sitting in a college dorm, think again. In just a few short years, cyber crime has evolved from the domain of individuals seeking notoriety to sophisticated organized crime

John the Ripper 1.7

Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what’s new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and

Navigating The Forensic Data Minefield

In today’s electronic environment, many high-profile cases have been solved through forensic searches of computerised media, and experienced electronic discovery professionals are now in great demand. Investigative teams should, however, remember to use electronic discovery in the context of an

NSA searches for advanced data mining tech

The National Security Agency (NSA) visited Silicon Valley this month on the hunt for private sector technology to beef up its already formidable snooping and signals intelligence portfolio. Data mining technologies to search for connections between seemingly unrelated snippets of

Cybercrime Summit, Feb 27 – Mar 3, 2006

Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts

UK rapped on data retention law

Britain’s net industry has named the UK presidency of the EU as its villain of the year. The Internet Service Providers’ Association (Ispa) singled out the UK for its role in pushing for Europe-wide data retention laws. The laws, requiring

Data Retention Directive endorsed by Ministers

The controversial Data Retention Directive received its final seal of approval on Tuesday, when Ministers at the Justice and Home Affairs Council adopted the Directive with a qualified majority. Irish and Slovak Ministers voted against the measure. In general terms,

Nowhere to hide

Be careful what you try to deny is the message from Ed Wilding, particularly if files retrieved from electronic devices have your name all over them. The forensic investigation of data held on computers, laptops, cellular telephones, PDAs and other

Washington Post fails to protect Deep Throat from metadata!

The Washington Post, famous for hiding the name of its Deep Throat source during the Watergate scandal, might have accidentally revealed the name of one of its sources in a less important yarn about a hacker…the article ran a doctored

Are non technical juries keeping criminals at large?

In England and Wales the only qualifications required of a jury member to be eligible to appear in a court of law are that they are registered on the electoral roll, aged between 18 and 70 and have lived in