Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Hero Image

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Police get 25,000 IP addresses in manhunt

AMSTERDAM, NL — Detectives investigating the Louis Sévèke case took possession of data on people who visited the political activist’s website. Family and friends said on Tuesday the police have an estimated 25,000 unique Internet Protocol (IP) addresses. The police

DHS cybersecurity budget grows to fight computer crime

With computer crimes on the increase, the Homeland Security Department is preparing to beef up its cybersecurity capabilities by increasing the budget of the National Cyber Security Division, home to the U.S. Computer Emergency Readiness Team (US-CERT). At a Jan.

Sebek 3: tracking the attackers, part one

It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker’s activities. Third Generation (GenIII) Honeynets provide all the components and tools required to gather this information at the deepest level. Sebek

UK security professionals back tougher laws for hackers

The IT security industry has almost unanimously given its backing to government plans to update the Computer Misuse Act (CMA) and introduce more severe custodial sentences for cyber criminals. And many are urging the government to now ‘go the distance’

Paraben Corporation Provides Proactive Forensic Solutions

“P2 Enterprise makes sure that not only is your network protected but you’ll have the evidence you need to prove your case as the incident occurs. P2 Enterprise Edition doesn’t stop with just traditional forensics; it takes forensics to a

Guidance Software Adds Patrick Zeller to Legal and Regulatory Team

Guidance Software announced today that it has added Chicago-based litigator Patrick Zeller to the Legal and Regulatory team as assistant general counsel. As both a former assistant attorney general focused on computer crime and as eDiscovery and litigation counsel with

Notre Dame probes hack of computer system

Two computer-forensic companies are helping the University of Notre Dame investigate an electronic break-in that may have exposed the personal and financial information of school donors… More (CNET)

Expansion imminent for computer forensics at Bloomsburg University (US)

Governor Rendell recently announced that Bloomsburg University will receive two state grants: a $200,000 grant to support the Greater Susquehanna Keystone Innovation Zone and a $63,000 grant to support the Pennsylvania Center for computer forensics research… More (Standard-Journal online)

Finding fraud in digital images (podcast)

Associate professor of computer science Hany Farid is interested in detecting whether a digital image has been manipulated. Because digital images are found everywhere today, he explains that his research can be used to examine images to see if they

CERT’s Virtual Training Environment (VTE) Open to Public

CERT’s Virtual Training Environment (VTE), with more than 160 hours of multimedia-based instruction in information assurance and computer forensics, is now available to the public. The Virtual Training Environment (VTE) is a Web-based knowledge library for Information Assurance, computer forensics

Tracing An Email

The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at

New computer forensics lab cracks down on identity theft

Pierce County is attacking identity theft with new technology and vigor that could warn potential victims sooner and lock up crooks longer. Investigators from the prosecutor’s office and sheriff’s department have opened a computer forensics lab that allows them to

TEAM MEMBER COMPUTER FORENSIC – VARIOUS LOCATIONS (AUSTRALIA)

The mission of the AFP is to provide dynamic and effective law enforcement to the people of Australia. It provides policing throughout Australia in relation to the prevention and detection of crimes against the Commonwealth, its laws and integrity, and

Widevine opens European offices in Cambridge, Lisbon

Widevine Technologies, a provider of downloadable content protection and digital forensics solutions, has opened two European offices in Lisbon, Portugal, and Cambridge, England. .. More (DMasia.com)

New paper: Analysis of hidden data in the NTFS file system

A new paper entitled "Analysis of hidden data in the NTFS file system" by Cheong Kai Wee of Edith Cowan University is now online. A full list of articles and papers held at Forensic Focus can be found here.