Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Hero Image

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

FBI Hunkered in The Bunker

Imagine you have this going for you: the best the world’s only super power can give you in personnel, intelligence, hardware and software with cost overruns no problem. Meet Steve Martinez, cyber G-man… More (internetnews.com)

Danish Web Hosting Company Adds Free Forensic Tool

Danish web hosting company EasySpeedy (http://easyspeedy.com) has added a software-based Forensic investigation utility to its Remote Recovery System. The company, who specializes in hosting dedicated servers and Linux/BSD, suggests the utility will enable customers to remotely recover their data while

T3i Launches Information Forensics Digital Laboratory

T3i, a leading information security consulting firm, announced today that it has launched its Information Forensics Digital Technology Laboratory (DTL). The Hi-Tech Digital Laboratory was established in order to provide T3i client’s with an expanded range of services including digital

Trail of evidence leads Secret Service to computer forensics

The reason the Secret Service puts so much emphasis on computer forensics is fairly simple: Computers are where the clues are. “Today, just about every crime scene has some form of digital evidence,” said Dale Pupillo, deputy special agent in

Making a case for computer forensics

A commitment to establishing a computer forensics operation is an expensive proposition, and it’s not a one-time purchase decision. Computers and software have to be upgraded frequently. New technologies, such as cell phones and personal digital assistants, require new tools

Digital clues help police land high-tech pirates

Last month, the Sacramento Valley Hi-Tech Crimes Task Force, along with the U.S. Attorney’s Office and the Secret Service, busted what they described as a massive DVD pirate ring. When the case goes to court, the prosecuting attorneys should have

Phishing attackers and their mules sent down

Three men who sent thousands of emails purporting to come from eBay, and four others who acted as so-called money mules, were sent to prison by Preston Crown Court yesterday, marking the first convictions for a UK-run phishing operation… More

Denial of Service prosecution fails

A British teenager has been cleared of launching a denial-of-service attack against his former employer, in a ruling that delivers another blow to the U.K’s Computer Misuse Act. At Wimbledon Magistrates Court in London, District Judge Kenneth Grant ruled Wednesday

Expanding computer sleuth company moves to Herndon

A team of computer sleuths is hard at work in Herndon, doing everything from telling clients how secure their network to doing computer forensic work to figuring out what files a client’s disgruntled employee might have leaked to a competitor.

Audit trails and computer forensics

If your employer accuses you of hacking into the company’s computing system and perpetrating a fraud, and you happen to be guilty, what is your safest tactic if you want to escape criminal charges? The answer is: Ask them to

Unlocking the power of computer crime evidence

Though computer evidence now appears in many cases, UK law is not clear on how to handle all this data. Neil Barrett discusses the measures being considered – and the effect they’ll have on computer crime prosecution… More (silicon.com)

IT Security Breach? Don’t just step in CSI Style

In every company in the UK there is likely to be a PC, and therefore an IT security breach is almost inevitable. These are the findings of the 2005 National High Tech Crime Unit report into the effect of computer

Seminar addresses digital forensics issues

Dr. Victor Fay-Wolfe, a computer science and statistics professor at the University of Rhode Island, spoke Friday in Pastore Chemical Laboratory concerning the field of digital forensics. Digital forensics, which Fay-Wolfe defined as “the application of forensic science technology to

Cyber crime business booming

Television crime shows such as “CSI” have brought the science of computer forensics to the forefront of public awareness. But just like about everything coveted by Hollywood, there exists a significant gap between art and reality. No one knows that

Version 3.0 EMail Detective released by Hot Pepper Technology, Inc.

Hot Pepper Technology, Inc. (http://www.hotpepperinc.com) has announced the release of version 3.0 of its E-Mail Detective – Forensic Software Tool. E-Mail Detective (EMD) provides investigators with a rapid and comprehensive method of retrieving all America Online E-mail messages and photos