Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Hero Image

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

SGI tries its hand at forensics

Police in Italy are using virtual reality technology from Silicon Graphics Inc. to re-create crime scenes on cases straight out of an episode of the hit TV show “CSI.” And it’s working. The Italian state police’s violent crime analysis unit

Met Computer Crime Unit scoops top honours

The Metropolitan Police Computer Crime Unit (CCU) scooped the coveted Editor’s Award at this year’s SC European Excellence Awards ceremony in London. Detective Constable Andy Cookson picked up the award and said he was delighted the CCU’s work was finally

EnCase Enterprise Edition in action

Computers make our lives easier but with technology comes the concern of children being victimized by those using technological advances to meet their own needs. Enter the ENCASE Enterprise Edition of Guidance Software, a digitized data forensics program that has

Virtual CSI: Crime-Scene Investigations Go Digital

For crime-scene investigators around the world, information technology is becoming an invaluable tool for cracking tough cases. Whether these crime scenes are virtual or physical, law enforcement is learning to use data-replication devices, specialized search tools, and virtualization software to

Web Browser Forensics, Part 2

Welcome to part two of the Web Browser Forensics series. In part one, we began investigating the intrusion of the Docustodian document management server hosting a law firm’s data. The server appeared to have been compromised by a group of

Digital highwaymen

Technology hit the headlines for the wrong reasons again last week, as a gang of British software pirates who characterised themselves as latter-day Robin Hoods found themselves in jail. The convictions underlined the perception that cybercrime is on the up,

Federation Warns Company Directors They Are at Risk from Their IT Department

The Federation Against Software Theft today warns UK company directors that they risk being branded ‘software thieves’ because of the actions of their employees, including those in the IT department. This comes in the wake of The Federation’s launch of

Crime time for Chinese net users

Around 20% of the world’s hijacked computers sending out spam, attacking websites and hosting unsavoury material are in China, says a report. The figures, from security firm Ciphertrust, come amid spiralling rates of internet use in China… More (BBC)

Police culture

If you ask Chris Budge, the police are no worse – and may even be a lot better – than any other organisation when it comes to looking at p**n at work. Budge should know. The computer forensic consultant runs

Criminal IT: The crime you can still get away with

In the field of computer crime, there is one glaring problem: the law. Until relatively recently, there was no law to criminalise what might be recognised as obvious ‘mischiefs’ performed against computers; there was no legal framework to make hacking,

Experts in distributed computing see potential for computer forensics

Golden Richard III, a professor of computer science at New Orleans University and a digital forensics expert, has been experimenting with using distributed computing to recover lost computer files. By harnessing the number-crunching power of several computers to work on