MD-Series Release Note Highlights : 2024 Q3 Review

Hero Image

GMDSOFT’s Q3 release for the MD-Series introduces key advancements, including enhanced device and app support, improved image analysis, VoIP call analysis, drone data extraction, and AI-driven video tools....

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Gernot Schmied, an IT civil engineer and court expert, reviews Amped Authenticate, a product from Amped Software designed to uncover the processing history of digital images and videos....read more

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11! Enjoy simplified Android FFS support, dark mode for XRY, streamlined Project VIC grading in XAMN, and improved file permissions in XEC. Plus, MSAB Kiosks and Tablets now support BitLocker and Wi-Fi....read more

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer v.1.6 is now available. Capture remote disk dumps, extract WhatsApp data via Wi-Fi, and use new passcode brute force tools. The update also includes speech-to-text in 50+ languages, enhancing remote investigations....read more

Kroll Ontrack Honors “Thought Leaders” in Electronic Discovery

Kroll Ontrack(R) has honored top legal professionals with its third annual Electronic Evidence Thought Leadership Awards. Award recipients include law firms, litigators, practice support professionals and scholars who have shown excellence and leadership in the field of electronic discovery. More

Crime fighters solve crimes by examining cell phones

Modern detectives are now using cell phone forensics to capture more and more criminals. Forensics, the science of preserving, extracting and examining data, has long been confined to computers. Now, with the help of cell phone seizure kits like the

Speak up to beat cybercriminals

The police have long complained that organisations that are the victims of computer crime are reluctant to come forward for fear an investigation will cripple their business as the police seize servers and PCs as evidence. On the other hand,

FBI’s new computer forensics lab already has full load

Blue lights flashed inside the Menlo Park office suite, a signal to the “propeller heads” – highly trained forensic computer examiners – that fellow FBI agents had arrived with another cyber-mystery for them to solve. This one was buried somewhere

Experts evolve new techniques to solve cyber crime

Electronic crime detection experts are working with police and forensic detectives in a Scottish university to establish new techniques to detect cyber crime, especially CP. “Anybody using a computer leaves a trail, and it’s very hard to cover that trail

FBI Computer Forensics Laboratory in “TOP 50” awards

The FBI’s Regional Computer Forensics Laboratory (RCFL) initiative has been chosen as one of the “Top 50” programs in the 2005 Innovations in American Government Awards competition. The RCFL Program is a national network of one-stop, full-service digital evidence laboratories.

UK police foil massive “online” bank theft

Police in London say they have foiled one of the biggest attempted bank thefts in Britain. The plan was to steal £220m ($423m) from the London offices of the Japanese bank Sumitomo Mitsui. Computer experts are believed to have tried

Web to have ‘terror watch’ team

Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a

Live each day like you’re going to be hacked

Forensics was a word repeated throughout this week’s SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft

A Method for Forensic Previews

During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless,

UK Government and industry back IT security professionalism plans

Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the

Video Forensics: Catching the Crooks on Camera

Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect’s face or his license plate, but this is far from reality. In fact, the recorded

Computer sleuths bring crime to light

When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they’re hunting more than just bytes of data. They’re looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department’s small but increasingly vital

Australian ISP raided for BitTorrent links

An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian

Cases confirm computer privacy is illusion

Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won’t do it for yourself, do it for your lawyer – the one