Digital Forensics Jobs Round-Up, August 18 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

How to legislate against hackers

Everyone is in favour of sending hackers to prison for longer, but technology commentator Bill Thompson wonders if our MPs are competent to make good cyber-laws… More (BBC)

Call For Papers – Digital Forensics Research Workshop (DRFWS) 2006

Call for Papers The 6th Annual Digital Forensic Research Workshop (DFRWS 2006) August 14-16, 2006 Purdue University Lafayette, Indiana, USA www.dfrws.org dfrws2006 (at) dfrws (dot) org The purpose of this workshop is to bring together researchers,practitioners, and educators interested in

Cyberthreats? Call a digital Sherlock Holmes

When the CEO of a small San Diego publishing company started receiving threatening e-mails from an anonymous address, he had a pretty good idea that someone in the company’s IT department was involved. The CEO called his lawyers, who in

New data deletion software for consumers

Software that its developers claim will completely eliminate sensitive data from hard drives has been developed by Nova Development. Drive Erase Pro is targeted at people who want to ensure a hard drive or memory card is truly blank before

Special agent uses teen talk and computer forensics

Most weekdays, and some weekends and nights, find Special Agent James May sitting in front of a PC in his Detroit office, waiting for some cyberjohn to hit on him. Well, not him exactly, but one of his many teenage

Chasing cyber-crime, one byte at a time

Tom Heflin is the resident surveillance technician and computer forensics expert for the Augusta County Sheriff’s office, the department’s first line of defense against computer-based crimes. His primary job: Cracking open hard drives and electronic media seized by deputies to

Battling the High Tech Crime Wave in Oregon

If your vision of a high tech criminal is a lone hacker sitting in a college dorm, think again. In just a few short years, cyber crime has evolved from the domain of individuals seeking notoriety to sophisticated organized crime

John the Ripper 1.7

Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what’s new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and

Navigating The Forensic Data Minefield

In today’s electronic environment, many high-profile cases have been solved through forensic searches of computerised media, and experienced electronic discovery professionals are now in great demand. Investigative teams should, however, remember to use electronic discovery in the context of an

NSA searches for advanced data mining tech

The National Security Agency (NSA) visited Silicon Valley this month on the hunt for private sector technology to beef up its already formidable snooping and signals intelligence portfolio. Data mining technologies to search for connections between seemingly unrelated snippets of

Cybercrime Summit, Feb 27 – Mar 3, 2006

Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts

UK rapped on data retention law

Britain’s net industry has named the UK presidency of the EU as its villain of the year. The Internet Service Providers’ Association (Ispa) singled out the UK for its role in pushing for Europe-wide data retention laws. The laws, requiring

Data Retention Directive endorsed by Ministers

The controversial Data Retention Directive received its final seal of approval on Tuesday, when Ministers at the Justice and Home Affairs Council adopted the Directive with a qualified majority. Irish and Slovak Ministers voted against the measure. In general terms,

Nowhere to hide

Be careful what you try to deny is the message from Ed Wilding, particularly if files retrieved from electronic devices have your name all over them. The forensic investigation of data held on computers, laptops, cellular telephones, PDAs and other

Washington Post fails to protect Deep Throat from metadata!

The Washington Post, famous for hiding the name of its Deep Throat source during the Watergate scandal, might have accidentally revealed the name of one of its sources in a less important yarn about a hacker…the article ran a doctored