Digital Forensics Jobs Round-Up, August 04 2025

Hero Image

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

FBI’s new computer forensics lab already has full load

Blue lights flashed inside the Menlo Park office suite, a signal to the “propeller heads” – highly trained forensic computer examiners – that fellow FBI agents had arrived with another cyber-mystery for them to solve. This one was buried somewhere

Experts evolve new techniques to solve cyber crime

Electronic crime detection experts are working with police and forensic detectives in a Scottish university to establish new techniques to detect cyber crime, especially CP. “Anybody using a computer leaves a trail, and it’s very hard to cover that trail

FBI Computer Forensics Laboratory in “TOP 50” awards

The FBI’s Regional Computer Forensics Laboratory (RCFL) initiative has been chosen as one of the “Top 50” programs in the 2005 Innovations in American Government Awards competition. The RCFL Program is a national network of one-stop, full-service digital evidence laboratories.

UK police foil massive “online” bank theft

Police in London say they have foiled one of the biggest attempted bank thefts in Britain. The plan was to steal £220m ($423m) from the London offices of the Japanese bank Sumitomo Mitsui. Computer experts are believed to have tried

Web to have ‘terror watch’ team

Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a

Live each day like you’re going to be hacked

Forensics was a word repeated throughout this week’s SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft

A Method for Forensic Previews

During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless,

UK Government and industry back IT security professionalism plans

Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the

Video Forensics: Catching the Crooks on Camera

Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect’s face or his license plate, but this is far from reality. In fact, the recorded

Computer sleuths bring crime to light

When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they’re hunting more than just bytes of data. They’re looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department’s small but increasingly vital

Australian ISP raided for BitTorrent links

An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian

Cases confirm computer privacy is illusion

Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won’t do it for yourself, do it for your lawyer – the one

Windows Security Log Encyclopedia (Press Release)

IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates

Deleted computer files never truly gone

“Whenever you delete a file, you’re really not deleting the file,” said Georges Stokes, system administrator for Air Armament Center plans and programs office. “The data is still technically there.” The information that people attempt to delete from their computers

Indian certificate course on cyber crime

The Indian Society of Criminology (ISC) in coordination with Valliant CISSTech is to offer certificate courses on Cyber Forensics and Penetration Testing. Announcing this at a press meet in Chennai yesterday, R Thilagaraj, secretary, ISC and head of the department