Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Hero Image

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Without a trace: Documents and deleted data

Documents tend to collect hidden data, which takes two forms. One is metadata, or data about a document, which is appended by the program, often unnoticed by the user. Then there’s data that was part of the original document but

Guidance – The Next Generation of Write Block Technologies

On February 22nd, Guidance Software will host an online seminar that will explore the next generation of write block technologies. One of the first rules taught in computer investigations is to assure that the original media is not altered, and

Anonymity on a Disc

To many privacy geeks, it’s the holy grail – a totally anonymous and secure computer so easy to use you can hand it to your grandmother and send her off on her own to the local Starbucks. That was the

Today’s FBI: Computer forensics, digital fingerprints

When you think of crime scenes and gathering evidence, perhaps DNA and fingerprints come to mind. But there’s another science which is helping law enforcement agencies like HPD find and convict criminals. It is the growing field of forensic computing.

Judge: OK To Look For Evidence In City Databases

A Becker County District Court judge has said an independent computer forensics expert can look for evidence in Moorhead, Minn. (US) city databases that police officers have to fulfill monthly quotas for traffic citations… More (wcco.com)

Sebek 3: tracking the attackers, part two

In part one of this series, we discussed the current Sebek development and its integration with GenIII Honeynets. In this article, we take it a step further and focus on best practices to deploy Sebek inside a GenIII Honeynet, as

Red Cliff Consulting LLC Rebrands as MANDIANT

The information security firm Red Cliff Consulting LLC has renamed itself MANDIANT, reflecting a major evolution in the company’s mission over the past year – a year that saw 150% revenue growth, the development of free software tools, and the

Computer records play large role in gathering evidence

Investigators are relying on computer records to trace Neil Entwistle’s steps in the days before he allegedly shot his wife, Rachel, and 9-month-old daughter, Lillian Rose. As computers play an ever-greater role in everyday life, they are becoming increasingly important

China Computer Forensics Conference, 17-18 June 2006

Sprite Guo, a policeman in China, has contacted me with details of the China Computer Forensics Conference 2006 (CCFC 2006), a computer forensics conference that takes place between members of the law enforcement community and computer forensic companies in China.

Texas Treasure owners indicted on interfering with an investigation

The company that runs the Texas Treasure cruise ship has been indicted on charges of interfering with an investigation. According to the indictment, the ship’s chief engineer is accused of lying to Coast Guard inspectors about records that track how

Call for Papers – 6th Annual Digital Forensic Research Workshop

The purpose of this workshop is to bring together researchers, practitioners, and educators interested in digital forensics. We welcome the participation of people in industry, government, law enforcement, and academia who are interested in advancing the state of the art

NSA eavesdropping: How it might work

Even a panel of determined senators couldn’t convince Attorney General Alberto Gonzales to divulge much about how the massive surveillance program conducted by the National Security Agency actually works. Gonzales told a Senate committee on Monday that he was not

CY4OR Sponsor Wales E Crime Summit 2006

The summit 2006 launched a three year Manifesto to tackle computer crime in Wales; the purpose being to protect businesses against the growing threat to them from electronic and computer based Crime. The conference was attended by the four major

European experts to analyze electronic evidence in EU Courts

The city of Florence will host next 17th February the meeting of the multidisciplinary researchers that are working together on the European Project about the Admissibility of the Electronic Evidence in EU Courts (A.E.E.C.). This innovative project is financially supported

Grand Traverse County looks to battle computer crimes

Grand Traverse County wants more training for sheriff’s deputies to combat an “alarming” rise in computer-based crimes. Undersheriff Nathan Alger said the department asked the county board for approximately $10,000 previously earmarked for vehicles to expand the department’s computer forensic

Vogon – New age sleuths

Since 2002, Vogon International LLC has operated a sophisticated data recovery lab in Norman. The lab, which serves clients throughout the U.S., Canada and South America, uses proprietary software to recover data from computer hard drives and backup tapes. The