Halfway Through The S21 Transcriber Spotlight Session

Hero Image

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Digital Forensic Readiness: Are You In?

As we approach a pervasive computing society, are you prepared for the challenge of using digital forensics to reconstruct a compromise? More (EIT)

Computer forensics tools maker hacked

Guidance Software had to do a forensic investigation on its own systems after a hacker broke in and accessed records, including credit card data, of thousands of customers. The attack occurred in November, but wasn’t discovered until Dec. 7, John

What is the Scope of Computer Forensics?

Jety asks: “I do general-purpose tech support for a variety of individuals and small businesses. Today, one of my clients presented me with an interesting situation, which made me recommend that he get his own attorneys and computer forensics experts

How to Keep a Digital Chain of Custody

Christine has very kindly mailed me with the following useful link: How to Keep a Digital Chain of Custodyhttp://www.csoonline.com/read/120105/ht_custody.html

Matching photographs to a camera’s “fingerprint”

Because almost all digital photos, including those used as evidence in court, are vulnerable to tampering, computer scientists and others are busy advancing the state of the art in digital forensics… More (Technology Review)

Officers get cyber training

The world has benefited in many ways from the information technology boom of the last 50 years, but the advancements have given crooks and predators yet another way to victimize. That means criminal investigations must evolve as well. Nowhere has

Steganalysis plug-in for Inforenz Forager computer forensics software

With its latest version of Forager® 1.3, Inforenz tackles the rising issue of information leakage by releasing a plug-in for its forensic software that identifies where data is concealed in other files. It enables computer forensic investigators to search for

Google Searches Help Convict Suspect

A North Carolina jury has found a man guilty based on evidence which included Google searches for the terms “neck,” “snap,” “break,” and “hold”. The man has been sentenced to life without parole, but plans to appeal the decision… More

Document metadata

Few things in the world of digital documents are as pesky and revealing as “metadata” – the information automatically embedded in documents by popular software such as Microsoft Word or Adobe Acrobat. When the government or a business forgets to

If a computer holds a clue, this lab will find it

What’s the best way to get into a criminal’s head? One group of area sleuths knows: Get into their computers. That’s what the men and women assigned to the Heart of America Regional Computer Forensics Laboratory do every day in

Technology Pathways Releases Freeware Forensic Software

Technology Pathways, LLC announced today the release of ProDiscover® Basic, a new freeware version of the ProDiscover Family of Computer Forensic Software…ProDiscover Basic provides a complete computer forensic solution including the ability to collect, preserve, analyze, and report on computer

Meet Bergen’s top cyber cop

Paramus detectives investigating a money-laundering scheme had confiscated a computer they suspected held crucial evidence. But its hard drive apparently had been wiped clean. At the time, many North Jersey police departments lacked the technical savvy and financial resources to

Detective combats rising computer crime

Detective Josh Moulin is a criminal forensic expert quite unlike the well-dressed heroes you see stalking bad guys across a fictional Miami every Monday night on CBS. Moulin spends his nights examining computers. He dissects them in a bland windowless

TVN’s Studio content digitally watermarked

In a recent announcement TVN Entertainment outlined that it will be using Widevine’s Mensor technology to watermark its entire VOD content line up. In the emerging digital forensics market, fingerprinting and watermarking provide another layer of security that enables content

UK MP tables modernisation of Computer Misuse Act

In summer 2003, the then e-crime minister Caroline Flint promised to answer growing disquiet about Britain’s computer crime laws by strengthening the Computer Misuse Act. But if a week is a long time in politics, a year and a half