The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Sebek 3: tracking the attackers, part one

It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker’s activities. Third Generation (GenIII) Honeynets provide all the components and tools required to gather this information at the deepest level. Sebek

UK security professionals back tougher laws for hackers

The IT security industry has almost unanimously given its backing to government plans to update the Computer Misuse Act (CMA) and introduce more severe custodial sentences for cyber criminals. And many are urging the government to now ‘go the distance’

Paraben Corporation Provides Proactive Forensic Solutions

“P2 Enterprise makes sure that not only is your network protected but you’ll have the evidence you need to prove your case as the incident occurs. P2 Enterprise Edition doesn’t stop with just traditional forensics; it takes forensics to a

Guidance Software Adds Patrick Zeller to Legal and Regulatory Team

Guidance Software announced today that it has added Chicago-based litigator Patrick Zeller to the Legal and Regulatory team as assistant general counsel. As both a former assistant attorney general focused on computer crime and as eDiscovery and litigation counsel with

Notre Dame probes hack of computer system

Two computer-forensic companies are helping the University of Notre Dame investigate an electronic break-in that may have exposed the personal and financial information of school donors… More (CNET)

Expansion imminent for computer forensics at Bloomsburg University (US)

Governor Rendell recently announced that Bloomsburg University will receive two state grants: a $200,000 grant to support the Greater Susquehanna Keystone Innovation Zone and a $63,000 grant to support the Pennsylvania Center for computer forensics research… More (Standard-Journal online)

Finding fraud in digital images (podcast)

Associate professor of computer science Hany Farid is interested in detecting whether a digital image has been manipulated. Because digital images are found everywhere today, he explains that his research can be used to examine images to see if they

CERT’s Virtual Training Environment (VTE) Open to Public

CERT’s Virtual Training Environment (VTE), with more than 160 hours of multimedia-based instruction in information assurance and computer forensics, is now available to the public. The Virtual Training Environment (VTE) is a Web-based knowledge library for Information Assurance, computer forensics

Tracing An Email

The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at

New computer forensics lab cracks down on identity theft

Pierce County is attacking identity theft with new technology and vigor that could warn potential victims sooner and lock up crooks longer. Investigators from the prosecutor’s office and sheriff’s department have opened a computer forensics lab that allows them to

TEAM MEMBER COMPUTER FORENSIC – VARIOUS LOCATIONS (AUSTRALIA)

The mission of the AFP is to provide dynamic and effective law enforcement to the people of Australia. It provides policing throughout Australia in relation to the prevention and detection of crimes against the Commonwealth, its laws and integrity, and

Widevine opens European offices in Cambridge, Lisbon

Widevine Technologies, a provider of downloadable content protection and digital forensics solutions, has opened two European offices in Lisbon, Portugal, and Cambridge, England. .. More (DMasia.com)

New paper: Analysis of hidden data in the NTFS file system

A new paper entitled "Analysis of hidden data in the NTFS file system" by Cheong Kai Wee of Edith Cowan University is now online. A full list of articles and papers held at Forensic Focus can be found here.

Defense lab accredited in computer forensics

After years of work, the Defense Computer Forensics Laboratory—part of the DOD Cyber Crime Center (DC3)—has been accredited by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Ralph Keaton, executive director of ASCLD/LAB, presented the certificate of accreditation to

Gov’t Cyber-sleuths Focusing on Linux, iPod, Xbox

Cyber-security and computer experts from the government and law enforcement are increasingly concerned with malicious code that runs on Linux and Apple Computer Inc.’s Mac OS X operating systems and threats posed by devices such as iPods and Xboxes. Intensive