Digital Forensics Round-Up, August 06 2025

Hero Image

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Paraben Corporation Provides Proactive Forensic Solutions

“P2 Enterprise makes sure that not only is your network protected but you’ll have the evidence you need to prove your case as the incident occurs. P2 Enterprise Edition doesn’t stop with just traditional forensics; it takes forensics to a

Guidance Software Adds Patrick Zeller to Legal and Regulatory Team

Guidance Software announced today that it has added Chicago-based litigator Patrick Zeller to the Legal and Regulatory team as assistant general counsel. As both a former assistant attorney general focused on computer crime and as eDiscovery and litigation counsel with

Notre Dame probes hack of computer system

Two computer-forensic companies are helping the University of Notre Dame investigate an electronic break-in that may have exposed the personal and financial information of school donors… More (CNET)

Expansion imminent for computer forensics at Bloomsburg University (US)

Governor Rendell recently announced that Bloomsburg University will receive two state grants: a $200,000 grant to support the Greater Susquehanna Keystone Innovation Zone and a $63,000 grant to support the Pennsylvania Center for computer forensics research… More (Standard-Journal online)

Finding fraud in digital images (podcast)

Associate professor of computer science Hany Farid is interested in detecting whether a digital image has been manipulated. Because digital images are found everywhere today, he explains that his research can be used to examine images to see if they

CERT’s Virtual Training Environment (VTE) Open to Public

CERT’s Virtual Training Environment (VTE), with more than 160 hours of multimedia-based instruction in information assurance and computer forensics, is now available to the public. The Virtual Training Environment (VTE) is a Web-based knowledge library for Information Assurance, computer forensics

Tracing An Email

The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at

New computer forensics lab cracks down on identity theft

Pierce County is attacking identity theft with new technology and vigor that could warn potential victims sooner and lock up crooks longer. Investigators from the prosecutor’s office and sheriff’s department have opened a computer forensics lab that allows them to

TEAM MEMBER COMPUTER FORENSIC – VARIOUS LOCATIONS (AUSTRALIA)

The mission of the AFP is to provide dynamic and effective law enforcement to the people of Australia. It provides policing throughout Australia in relation to the prevention and detection of crimes against the Commonwealth, its laws and integrity, and

Widevine opens European offices in Cambridge, Lisbon

Widevine Technologies, a provider of downloadable content protection and digital forensics solutions, has opened two European offices in Lisbon, Portugal, and Cambridge, England. .. More (DMasia.com)

New paper: Analysis of hidden data in the NTFS file system

A new paper entitled "Analysis of hidden data in the NTFS file system" by Cheong Kai Wee of Edith Cowan University is now online. A full list of articles and papers held at Forensic Focus can be found here.

Defense lab accredited in computer forensics

After years of work, the Defense Computer Forensics Laboratory—part of the DOD Cyber Crime Center (DC3)—has been accredited by the American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Ralph Keaton, executive director of ASCLD/LAB, presented the certificate of accreditation to

Gov’t Cyber-sleuths Focusing on Linux, iPod, Xbox

Cyber-security and computer experts from the government and law enforcement are increasingly concerned with malicious code that runs on Linux and Apple Computer Inc.’s Mac OS X operating systems and threats posed by devices such as iPods and Xboxes. Intensive

FTC launches site to fight cybercrime

Responding to the rising cybercrime threat, the Federal Trade Commission on Tuesday unveiled an online tool designed to help consumers avoid becoming victims of Internet scams. At the website, www.onguardonline.gov, consumers can take interactive quizzes designed to enlighten them about

Undelete those deleted emails, FOIA ruling tells UK Government

‘Deleted’ Government records needn’t necessarily be treated as deleted after all, according to a ruling by the Information Tribunal, which deals with appeals against rulings under the Freedom of Information Act. “The Tribunal understands that information which is held electronically