Digital Forensics Jobs Round-Up, June 16 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Oxygen Tech Bytes In May 2025

Oxygen Tech Bytes In May 2025

Discover practical digital forensics solutions in under 20 minutes with Oxygen Tech Bytes. Watch the latest on-demand episodes covering biometric workflows, password recovery with KeyDiver, and fast data loading techniques....read more

Forensic Focus Digest, June 13 2025

Forensic Focus Digest, June 13 2025

Discover what's new on Forensic Focus – explore advanced H265 video analysis with Amped FIVE, dive into the latest Oxygen Analytic Center updates, uncover Magnet Forensics' innovative cloud-powered processing, and more....read more

How To Analyze H265 Video Compression With The Coding Tree Units Filter In Amped FIVE

How To Analyze H265 Video Compression With The Coding Tree Units Filter In Amped FIVE

Struggling with H265 video in investigations? Learn how CTUs in Amped FIVE reveal image reliability and hidden compression artifacts....read more

New Article: Job hunting advice for UK computer forensics professionals

A superb new article by David Sullivan entitled “Job hunting advice for UK computer forensics professionals” is now online at http://www.forensicfocus.com/computer-forensics-jobs-uk I am sure our UK members will find it a very worthwhile read! Jamie

Fraud propels demand for computer forensics training

In the ‘if you can’t beat ’em, join ’em stakes’, computer-based crime is driving more and more IT professionals to study the skills and tools needed to unravel and reveal the inner workings of cyber fraudsters. The general upsurge in

Browser History: What Happened?

Occasionally, you might need to trace a user’s Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser’s cache, and browser history data, isn’t easy. For a good rundown on forensic analysis of browser activity, you should

New Article: Mining the Protected Storage Area

A new article by Andy Dodd entitled "Using areas of the Microsoft Windows registry to mine data for use in Forensic Computing" has been added to the computer forensics papers and articles section. We are always happy to consider new

Skeletons on your hard drive

There are a number of options for cleansing the drives of unwanted computers, from special wiping software to destruction services to manufacturers’ recycling programs. But what many PC owners don’t realize, experts say, is that these methods are often not

Task force cracks down in California

Computer crimes are like viruses – they infect many and quickly, mutating as technology grows ever more complex. In the Solano area, though, there’s an antidote – “NC3TF.” In layman’s terms, that’s the Northern California Computer Crimes Task Force, a

It’s no secret — they’re here to help (with computer forensics)

Local US law enforcement agencies that lack resources and technology to extract and analyze the data on seized computers and electronic devices now can turn to the U.S. Secret Service for help. Government technicians will analyze computers, cell phones and

Forensic Focus email list changes

The Forensic Focus email list has moved from the old Yahoo! Groups system to our own software. This should speed up the registration process and remove the commercial advertising which was previously present. To subscribe, please send a blank email

UK police tackle mounting internet caseload

British police are refining their crackdown on internet p—-philes as a swelling caseload of offences involving the downloading of images of child abuse pushes computer forensics teams to their limits. According to police sources over 300 people a month are

Data Recovery: What to do when back-ups break down

Businesses are so reliant on their data that only the very naive do not make regular back-ups. And if lack of business sense prevents some companies from running sensible housekeeping routines, new and stringent legislation now requires businesses to keep

Leave it to the expert

Cyber crime investigation is not merely one of finding out how a computer system was hacked. It is sometimes also about how a system has been used to facilitate a conventional crime, such as a homicide or an extortion. There

Messages Can Reveal Sender’s Real Agenda

E-mails are becoming a major part of investigative trails, whether they involve criminal activity, civil lawsuits, regulatory examinations or internal malfeasance within a company. Often more conversational and informal than paper documents, they can reveal the intent or motive of

Approaches, Trends and the Real Market Definition for Log Management

SANS will present the following webcast on Tuesday, April 26 at 4:00 PM EDT (2000 UTC) Featuring: Stephen Northcutt and Dominique Levin Sponsored by: LogLogic Stephen Northcutt will share his analysis of the growing importance of proper log management, including

Cyber Forsensics…Still a Way to Go

Purdue’s Spafford is worried about the ad hoc nature of cyber forensics today. “I am concerned that we develop a more scientific and rigorous approach so that we may have confidence in the results,” he stressed. “It is unfortunate if