The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Data Recovery: What to do when back-ups break down

Businesses are so reliant on their data that only the very naive do not make regular back-ups. And if lack of business sense prevents some companies from running sensible housekeeping routines, new and stringent legislation now requires businesses to keep

Leave it to the expert

Cyber crime investigation is not merely one of finding out how a computer system was hacked. It is sometimes also about how a system has been used to facilitate a conventional crime, such as a homicide or an extortion. There

Messages Can Reveal Sender’s Real Agenda

E-mails are becoming a major part of investigative trails, whether they involve criminal activity, civil lawsuits, regulatory examinations or internal malfeasance within a company. Often more conversational and informal than paper documents, they can reveal the intent or motive of

Approaches, Trends and the Real Market Definition for Log Management

SANS will present the following webcast on Tuesday, April 26 at 4:00 PM EDT (2000 UTC) Featuring: Stephen Northcutt and Dominique Levin Sponsored by: LogLogic Stephen Northcutt will share his analysis of the growing importance of proper log management, including

Cyber Forsensics…Still a Way to Go

Purdue’s Spafford is worried about the ad hoc nature of cyber forensics today. “I am concerned that we develop a more scientific and rigorous approach so that we may have confidence in the results,” he stressed. “It is unfortunate if

Detectives Tainted Hard Drive, Expert Claims

BENTONVILLE, USA – Evidence on the hard drive of a murdered man’s computer was damaged after police seized the machine, a computer forensics expert testified Thursday. After Howard was murdered in September 1999, police used information from his hard drive

New Paper: Is There a Need for Industry Control?

A very thought provoking article from Nick Furneaux of CSITech entitled “Is There a Need for Industry Control?” has been added to our Papers & Articles page and can also be viewed directly here.

UK Police forced to turn away e-crime victims

UK Police are having to turn down requests to investigate computer crime from businesses due to a lack of resources, the National Hi-Tech Crime Unit said last week. Mick Deats, deputy head of the unit, said the complex, time-consuming nature

Ibas buys computer forensics rival Vogon

Data recovery and computer forensics firm Ibas announced plans Monday to buy its main European competitor, UK-based Vogon International. The deal is based on an “earn-out” model, which specifies a minimum price of £4m ($7.5m) and a maximum of £9m

The two-edged sword: Legal computer forensics and open source

Ryan Purita of Totally Connected Security is one of the leading computer forensic experts in private practice in Canada. A GNU/Linux enthusiast, Purita often prefers open source tools. However, he frequently uses proprietary ones as well. The proprietary tools, he

New, smarter generation of Internet crooks

“I work in the fraud dept. for a well known US company, and have access to hundreds of CCs (credit card numbers) on a daily basis. All I’m looking for is an easy way to make some money and stay

Police surf in search of criminals

Police and prosecutors are awaiting the results of a forensics shakedown of the computer used at work by Richard Salewicz of Noblesville, who was arrested April 1 for soliciting sex over the Internet from an undercover officer. Noblesville (US) Police

New versions of TSK and Autopsy now available

New versions of both tools are available. Both have minor bug fixes from the new 2.00 TSK features. There is one bug that impacts split image users, so everyone should upgrade TSK. Autopsy also has a new feature that shows