Digital Forensics Round-Up, March 26 2025

Hero Image

Read the latest DFIR news – SWGDE calls for faster mobile data preservation, SOLVE-IT proposes a forensic ATT&CK-style framework, SYTECH urges national CSAM threshold reform, and more....

What’s Happening At Techno Security Wilmington, June 03 – 05 2025

What’s Happening At Techno Security Wilmington, June 03 – 05 2025

Explore the latest in cybersecurity, digital forensics, eDiscovery, and investigations at Techno East—120+ sessions, hands-on labs, and live CTFs await....read more

Oxygen Remote Explorer v.1.8 Is Now Available

Oxygen Remote Explorer v.1.8 Is Now Available

Oxygen Forensics' latest update adds remote Slack extraction from Android, new artifact support, and enhanced import, export, and decryption features for more efficient investigations....read more

Oxygen Forensics Helps Clients Take Their Data Strategy To The Next Level

Oxygen Forensics Helps Clients Take Their Data Strategy To The Next Level

Oxygen Forensics and ModeOne Technologies partner to streamline remote mobile data collection and enhance data analysis workflows....read more

Top cops of London, Delhi meet

Top officials of London Police yesterday met their counterparts in New Delhi to discuss areas of mutual interest, including cyber crime and computer forensics. Commissioner of London Metropolitan Police John Stevens and Deputy High Commissioner of Britain Mark Runacres, accompanied

Method Provides Double Computer Crime-Solving Evidence

Like an episode of “CSI: Computers,” a UF researcher has developed a technique that gives digital detectives twice the forensic evidence they now have to catch all kinds of hackers, from curious teenagers to disgruntled employees to agents of foreign

Final version of NIST’s “Guidelines on PDA Forensics” complete

Special Publication 800-72, entitled Guidelines on PDA Forensics, was developed to help organizations evolve appropriate policies and procedures for dealing with PDA forensics and to provide forensic specialists with a background on the technology, tools, and principles involved. The intended

The lighter side of data recovery

An executive who froze his broken hard disk thinking it would be fixed has topped a list of the weirdest computer mishaps. Although computer malfunctions remain the most common cause of file loss, data recovery experts say human behaviour still

Stopping Computer Crime

Stopping computer crime requires two basic things: You need to let criminals know it won’t be tolerated by reporting and prosecuting, and tell the world what these crimes are and how folks can avoid being a victim. It’s not enough

Meticulous cybersleuth takes on high-tech cases

Just call William Simon the Sherlock Holmes of computers. The cyberspace sleuth would love the comparison. In fact, he named his business, Abberline Investigations, after his distant cousin Frederick Abberline, a Victorian-era Scotland Yard investigator. The licensed private investigator, with

Detective, check that hard drive

Noble Dean will graduate from Purdue University for the second time in December with his master’s degree in science and technology. His degree has taught the 31-year-old to look at the world in an entirely different light. “This,” he said,

E-mail Discovery Primer for Legal Professionals

A Non-Technical Primer – Taught by Warren Kruse and Steven Branigan. From the comfort of your home or office anytime 24 hours/day, 7 days/week. What do you need to know when making or receiving an Electronic Discovery request pertaining to

Easy to defeat computer forensics

Breaking into computer networks and remaining untraceable after the breach has been detected is apparently easier than anyone would like it to be, said The Grugq, a Britain-based hacker. The Grugq, who refused to reveal his true identity, said remaining

Data recovery, Australian style

A couple of Australian coppers have used their forensic expertise to create a software company that has chalked up success in Europe and Japan. And by Christmas they will be showing the Yanks how as well. The two “dumped-data detectives”

FBI agents use computer forensics to arrest sexual predators

It’s not surprising that FBI Special Agent Tom Veivia considers himself an overprotective parent. In a cramped room equipped with eight computers, Veivia works with undercover agents and police officers in the Innocent Images National Initiative. Working late evening and

Jackson Local Law Enforcement Learns to Fight Cyber Crime

In the world of cyber crimes, law enforcement officials need the same computer skills as criminals to fight back. This week, metro area law enforcement is getting the ammunition to fight the growing number of computer crime suspects. More (WLBT)

High-Tech Crimes Revealed: An Interview with Stephen Branigan

Stephen Branigan, one of the founders of the New York City task force on cybercrime and author of High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front, talks to Seth Fogie about hacker motivations and how to solve cyber crimes.

Computer expert challenges barge defendant’s testimony

A computer forensics expert says a critical document presented to jurors was edited on one of the defendants’ work computers – contradicting the defendant’s testimony last week. That’s the latest in the fraud and conspiracy trial of four former Merrill