Digital Forensics Round-Up, August 06 2025

Hero Image

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Windows Security Log Encyclopedia (Press Release)

IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates

Deleted computer files never truly gone

“Whenever you delete a file, you’re really not deleting the file,” said Georges Stokes, system administrator for Air Armament Center plans and programs office. “The data is still technically there.” The information that people attempt to delete from their computers

Indian certificate course on cyber crime

The Indian Society of Criminology (ISC) in coordination with Valliant CISSTech is to offer certificate courses on Cyber Forensics and Penetration Testing. Announcing this at a press meet in Chennai yesterday, R Thilagaraj, secretary, ISC and head of the department

Tracking PCs anywhere on the Net

A University of California researcher, Tadayoshi Kohno, says he has found a way to identify computer hardware remotely, a technique that could potentially unmask anonymous Web surfers by bypassing some common security techniques. In his paper Kohno mentioned possible forensics

Testifying in a Computer Crimes Case

As an IT professional and working network administrator, you may find yourself called upon to testify as a victim or witness (i.e., a representative of a company whose network is victimized) in a computer-related crime. Another possibility is that you

The value of sleuthing skills in IT security

In criminal investigations, forensic evidence is often used to prove that a person was at a particular place at a certain time, or even to show an irrefutable connection with a crime that has been committed. In the world of

Are you sitting next to a criminal?

Computer criminals could be working next to you every day, yet be stealing from your business. A survey carried out on 201 companies by the National High Tech Crime Unit, found that the impact of hi-tech crime in 2003 reached

Computer sleuths dig deep to solve crimes

John Mallery says his current job as a computer forensic expert has some parallels to his former calling as a comedian, juggler and knife thrower. “I’ve thrown knives around my wife. If I’m not in shape and I don’t practice,

‘Unit needed’ to tackle net porn

UK Police want a new body to be set up to investigate internet child pornography. It comes as new figures show arrests and convictions for downloading such images have quadrupled in two years. Home Office figures, revealed by children’s charity

New Tool May Aid Digital Investigators

For some University of Florida (UF) researchers, CSI means “Computer Scam Investigators.” The team is armed with a new tool – so-called “process forensics” – that combines intrusion detection with digital fingerprinting to nab wily hackers… More (Sci-Tech Today)

More investigators needed to handle computer crime in Maine (US)

When it comes to computer crimes, especially against children, those in law enforcement should not be trying to do more with less. But that is exactly what the Maine Computer Crimes Task Force is doing these days, according to Col.

Criminal IT: What you can do to help the fight against cybercrime

Neil Barrett gives some insight into how IT workers can help law enforcement and expert witnesses like himself when prosecuting cybercriminals. My day job is a rather unusual one; I’m a computer expert witness, principally in criminal prosecutions and primarily

Fraud Prevention on Top of Agenda for Corporate Boards in 2005

Computer forensics have played a lead role in fraud investigations for some time. In the coming year, look for the emergence of real-time, diagnostic software that will enable corporations to detect “red flags” of potential accounting fraud or other types

Feds square off with organized cyber crime

At the RSA Conference on Thursday Ronald Plesco, counsel to the National Cyber-Forensics and Training Alliance, a computer forensics organization established by the FBI and private industry, pointed to the trend in recent years of spammers building networks of compromised

Investigators uncover dismal data disposal

An investigation into the disposal of computer equipment has uncovered psychological reports on school-children, confidential company data and even details of an illicit affair on hard drives that should have been wiped clean. Universities, schools and global businesses are routinely