Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Hero Image

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

New forensic computing company in the UK – Innovision

Andy, one of our longest standing members and forum regular, has moved into private practice with the establishment of Innovision, a forensic data investigation service based in the UK. I asked Andy to sum up the services his firm will

Submissions Being Accepted for Timothy Fidel Award

PASADENA, Calif., Aug. 31 /PRNewswire/ – Building on the success of the inaugural Timothy Fidel Memorial Award, Guidance Software along with AccessData, today announced the Timothy Fidel Memorial Award Committee. The Committee was created as the decision making body for

Computer forensic experts to track copied Clio e-mails

The [Clio] Board of Education voted unanimously Monday to hire a computer forensics company to investigate e-mail tampering in the district. Board members said they hope the investigation by Southfield-based Center for Computer Forensics reveals who has gained access to

Forensics is not just a word for cops

Last year, two employees of AdvantaCare Health Partners resigned and launched their own start-up. Prior to leaving, they copied patient databases, confidential business plans, and other trade secrets, and used this information to compete with AdvantaCare. Before leaving, they tried

Group honors high-tech work on BTK

A Wichita police detective who helped solve the BTK murder cases has won an international crime investigation award. Detective Randy Stone, whose computer sleuthing provided a turning point in the hunt for BTK, will be given an award for “forensics

Storm brewing over SHA-1 as further breaks are found

Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be

Computer Forensics and Its Impact on Employment Litigation

Computer forensics is becoming a routine part of many employment cases. To cite a few recent examples handled by our firm: After a key employee suddenly resigned, the employer hired a computer forensics company to search the hard drive of

New forensic software released

With a raft of bogus bank Web sites and phishing scams flooding computers, it would appear that crime has gone dotcom like everything else. However, a new forensic tool has stepped into the computer crime scene to help search, not

Messages of fear in hi-tech invisible ink

The first sign that something was amiss came a few days before Christmas Eve 2003. The US department of homeland security raised the national terror alert level to “high risk”. The move triggered a ripple of concern throughout the airline

Judge weighs access to victim’s PC

The attorney representing Michael Hernandez, the teen charged with murdering his classmate last year in the bathroom of their middle school, wants to peek into the victim’s mind by scanning through the memories of the slain boy’s computer… More (Sun-Sentinel.com)

New paper: An Analytical Approach to Steganalysis

A new paper, "An Analytical Approach to Steganalysis" by James Wingate and Chad Davis, is now online and can be found here. A full list of articles and papers held at Forensic Focus can be found here. New submissions are

Software hide and seek

Delete isn’t enough anymore. Consider the case of Robert Johnson, the former Newsday publisher who, prosecutors allege, used a software program called Evidence Eliminator to rid his computers of CP. Pressing ”delete” makes files invisible, perhaps, but it doesn’t make

Secret files may be record of past crimes

Three days before police say he murdered an Idaho family, Joseph Duncan bragged online about an encrypted, tell-all journal that wouldn’t be broken into for decades. He figured technology would catch up in 30 years, “and then the world will

Diskology Adds Write Blocking to Portable Hard Disk Duplicator

Diskology, Inc. announced a new version of their award-winning Disk Jockey portable hard disk duplicator today. The new model includes a write blocking feature essential for computer forensic examinations. The new unit is available as part of a “Forensic Kit”

Forensic Computers release Linux forensic system

Forensic Computers announced today that they have released a Linux forensic system that integrates the full technical, legal and personnel requirements into a complete package in conjunction with TaFusion MEPIS Linux. A live CD is included with the application that

UK police want new computer powers

The UK Association of Chief Police Officers (ACPO) has called for new powers to allow police to tackle rogue websites, and make withholding encryption keys a criminal offence. The new proposals are buried inside a long and sometimes controversial list