Digital Forensics Round-Up, August 06 2025

Hero Image

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Denial of Service prosecution fails

A British teenager has been cleared of launching a denial-of-service attack against his former employer, in a ruling that delivers another blow to the U.K’s Computer Misuse Act. At Wimbledon Magistrates Court in London, District Judge Kenneth Grant ruled Wednesday

Expanding computer sleuth company moves to Herndon

A team of computer sleuths is hard at work in Herndon, doing everything from telling clients how secure their network to doing computer forensic work to figuring out what files a client’s disgruntled employee might have leaked to a competitor.

Audit trails and computer forensics

If your employer accuses you of hacking into the company’s computing system and perpetrating a fraud, and you happen to be guilty, what is your safest tactic if you want to escape criminal charges? The answer is: Ask them to

Unlocking the power of computer crime evidence

Though computer evidence now appears in many cases, UK law is not clear on how to handle all this data. Neil Barrett discusses the measures being considered – and the effect they’ll have on computer crime prosecution… More (silicon.com)

IT Security Breach? Don’t just step in CSI Style

In every company in the UK there is likely to be a PC, and therefore an IT security breach is almost inevitable. These are the findings of the 2005 National High Tech Crime Unit report into the effect of computer

Seminar addresses digital forensics issues

Dr. Victor Fay-Wolfe, a computer science and statistics professor at the University of Rhode Island, spoke Friday in Pastore Chemical Laboratory concerning the field of digital forensics. Digital forensics, which Fay-Wolfe defined as “the application of forensic science technology to

Cyber crime business booming

Television crime shows such as “CSI” have brought the science of computer forensics to the forefront of public awareness. But just like about everything coveted by Hollywood, there exists a significant gap between art and reality. No one knows that

Version 3.0 EMail Detective released by Hot Pepper Technology, Inc.

Hot Pepper Technology, Inc. (http://www.hotpepperinc.com) has announced the release of version 3.0 of its E-Mail Detective – Forensic Software Tool. E-Mail Detective (EMD) provides investigators with a rapid and comprehensive method of retrieving all America Online E-mail messages and photos

Computer forensics making a difference

For the last four years, David Usery, 47, has been a man the public doesn’t see — a pivotal person behind thousands of criminal case investigations from the 9th judicial District Attorney’s Office and New Mexico State Police as well

Fighting cybercrime on a shoestring budget

In cramped, dingy offices near New York’s East River, a couple dozen detectives and analysts hunch over computers, plowing their way through hundreds of criminal cases. This is the home of the New York Police Department Computer Crime Squad. The

Digital fingerprint cracks the case

Last month, when Australian Federal Court Judge Murray Wilcox ruled that Kazaa is illegally authorising copyright infringement, he put Australia on the world map of landmark intellectual property cases – related cases against Kazaa in the US had previously failed.

Microsoft, Nigeria Join Forces Against Cybercrime

Microsoft Latest News about Microsoft is lending its I.T. expertise to the government of Nigeria in a joint effort to combat e-mail fraud and other cybercrimes in the African nation… More (Top Tech News)

Computer Evidence: Collection & Preservation

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because these two phases of

Secret tracking codes in laser printers cracked

The pages that are printed by your colour laser printer may include tiny dots, almost invisible to the naked eye. The dots form a code that can be read by the US Secret Service, ostensibly to track down counterfeiters. Now,

Cybercrooks lure citizens into international crime

Consumer-level financial fraud has been around since thieves first thought to filch blank checks from mailboxes. The Internet has taken it to a new level, not yet fully understood by the general public. By many measures, 2005 is shaping up

Cyber crime and the Indian Police force

I am often quizzed by friends on how savvy the Indian Police are in handling cyber crime. Although it is a few years since I left the force, I have been closely following trends of cyber investigation and Court decisions.