Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

FBI Opens New Bay Area Forensics Lab

They are the types of evidence now linking virtually every case the FBI investigates – high-tech devices used by criminals. Now the FBI is sharing its high-tech tools with Bay Area law enforcement by opening a new forensics lab. More

Begin a forensics investigation with WinHex

The time may come when you need to examine a hard drive either because you need to recover some lost data or because you suspect an employee of a violation. Whether you intend to use your findings in court, for

Cyber crime booms in 2004

The last 12 months have seen a dramatic growth in almost every security threat that plague Windows PCs. The count of known viruses broke the 100,000 barrier and the number of new viruses grew by more than 50%. Similarly phishing

Sleuths follow digital crime trails

Kansas City, Mo. — First, they testified that a suspect in a Douglas County murder searched the Internet for terms including “How to murder someone and not get caught.” Then they used computer records to find the Kansas woman suspected

N.H. Focuses On Computer Crime

New Hampshire is stepping up its fight against computer criminals. Speaking at a conference on white-collar crime, Attorney General Kelly Ayotte said her office is considering a proposal to create a “master computer brain” to help investigate computer crime. The

DoD Cyber Crime Conference

REGISTER TODAY for This Timely Conference4th Annual DoD Cyber Crime Conference & ExpositionCyber Crime – Overcoming the Challenges of New Technology__________________________________________________________________ Conference Dates: January 10-14, 2005 Pre-Conference Training: ILook 8 Training Course and other CEU courses, January 9-10, 2005 Exposition

UK government to delete millions of emails

It has led to the downfall of many. Now the UK government is arranging the deletion of millions of e-mails. But is it really as easy as hitting a button on the keyboard? E-mail has a long memory, as former

Real-world data recovery dramas

“Do as I say, not as I do”, ought to be the catchphrase of many IT executives. We all know about the unwritten law that computer hard drives crash only when it’s going to do most damage. Fortunately, Computer Forensics

Authorities use computers to track down woman accused of murder

Authorities say they used computer forensics to zero in on a Kansas woman accused of killing another woman and stealing her unborn baby. The baby, that had been cut out of her mother’s womb, was found alive Friday after a

Napier ‘spy’ software set to fight terrorism

Computer “agents” which can help fight global terrorism and organised crime are being developed by scientists at an Edinburgh university. Academics at Napier University are creating software programs which act as detectives – accessing other computers via the internet or

Cellphone Forensic Software Open Sourced

The Netherlands Forensic Institute (part of the Dutch Ministry of Justice) has open sourced one of their high-profile software frameworks, TULP2G. With this BSD licensed framework, one can extract and decode all data from GSM SIM cards, e.g. called phone

Computer forensics aids schoolyard fight investigators

A second teen has been charged in a schoolyard fight that was videotaped, set to music and sold to high school students in an edited form. With the help of Beaverton computer forensics company NTI Breakwater, police were able to

Version 0.69 of the Honeywall CDROM released

The Honeynet Project has announced the release of version 0.69 of the Honeywall CDROM. Some key features of this new version include – – Whitelisting: The ability to identify IP’s and networks youwant to allow inbound and outbound of your

Detection of ‘counterfeit reality’ becoming a new specialty

During the past decade, the DNA technology used to solve crimes and settle paternity suits has become a big business. The federal government alone spent $232 million this past fiscal year promoting the use of a technology that barely existed

Top cops of London, Delhi meet

Top officials of London Police yesterday met their counterparts in New Delhi to discuss areas of mutual interest, including cyber crime and computer forensics. Commissioner of London Metropolitan Police John Stevens and Deputy High Commissioner of Britain Mark Runacres, accompanied