Digital Forensic News & Events
Bringing investigators digital forensics and cybersecurity related news from around the world. #AllinForensics


 

Cybercrime: What It Is and How To Stay Safe

June 29, 2022

The development of new technology has changed the ways information is disseminated and accessed. It has allowed individuals to access a variety of information within minutes. Although, with this growing use and dependence on technology the tactics used in cybercrime have evolved to effectively infiltrate these ever-changing systems. Maintaining the knowledge and tools needed to counteract these cybercrime attempts has become paramount. Any user that is dependent on technological gadgets and software can be at risk of cybercrime. In this post, we will discuss what exactly is cybercrime and how to stay safe. 

Read More

Crime Investigation Software: Gain Intelligence on Cybercrime

June 24, 2022

Cybercrime has been increasing significantly over the years [1] Crime investigation software is vital for law enforcement agencies to gain actionable and substantial criminal intelligence from cyber crimes committed. Investigating cyber crimes is complex and requires tools to conduct mobile and computer forensics such as Mac forensics, to collect evidence from iOS, Android, Linux, Windows, and Mac devices. Analyzing the data collected is an important part of conducting an investigation. Forensic software tools help agents, officers, and investigators link different artifacts together to generate a full report on the investigation.

Read More

Top 4 Ways to Amplify Cyber Security with Investigation Software

June 22, 2022

Modern times have increased the number of devices, programs, users, and data, making agencies and businesses vulnerable. Cyber-attacks have taken on more sophisticated forms over time. Cyber security allows agencies to protect their internet-connected systems such as software, hardware, and data [1]. Cyber security includes technologies, processes, and methods to defend these computer systems. It is imperative to incorporate strong strategies in cyber security in the world of digital forensics to prevent malicious attacks intended to access sensitive data. In this post, we will provide the top 4 ways to amplify cyber security using Cyber Crime Investigation Software

Read More

Digital Forensics at the Beach

May 13, 2022

This week, hundreds of cyber security and digital forensic experts gathered in Myrtle Beach, South Carolina to participate in the Techno Security and Digital Forensics Conference. The event hosted at the Marriott Resort & Spa at Grande Dunes offered attendees the ability to receive Continuing Professional Education Credits (CPE) depending on their organization. 

Read More

5 Reasons Why You Need to Invest in Computer Forensics Software

March 31, 2022

Many are not aware of the common threats/investigations that officers, analysts, and investigators face on-scene or in the lab and how computer forensics software can help solve these investigations.

Read More

VR is Taking Internet Abuse and Exploitation to New Levels

March 11, 2022

VR is an exciting and revolutionary modern technology that is steadily being released to the public, with companies such as Steam, PlayStation, Oculus, HTC, and most recently Meta rapidly releasing content to be consumed by people all over the world. But as with all technological advancements, there are certain risks, dangers, and adversities. As a disclaimer, sensitive topics such as child exploitation and sexual abuse will be mentioned in this article.

Read More

Techno Security & Digital Forensics Myrtle Beach 2019

May 7, 2019

The 2019 Techno Security & Digital Forensics Conference in Myrtle Beach, South Carolina will take place June 2-5 at the Marriott Resort & Spa at Grande Dunes.  Attendees will have the ability to receive Continuing Professional Education Credits (CPE) depending on their organization. 

Nearly 1,000 attendees are expected to attend with more than 100 sessions by about as many speakers.  We recommend you select the full conference pass which gives you access to the keynote address, all sessions, the exhibit hall (50+ exhibitors) and networking receptions, breakfast and refreshment breaks on Monday, Tuesday and Wednesday as well as lunch on Monday and Tuesday.  

Read More

What is Sensitive Site Exploitation?

January 28, 2019

Sensitive Site Exploitation refers to techniques used by military and intelligence officers to collect and exploit captured equipment, media and documents in theaters of operation around the world.  The process of exploiting sensitive or tactical sites to gather intelligence from targets for counter terrorism, force protection, or other national security needs is performed by forward operators using exploitation kits that can: 

Read More

FLETC Cybercrime Technical Investigations Conference

September 5, 2018

Rich Frawley, ADF Digital Forensic Specialist will be presenting "On-Scene Digital Investigation Best Practices: From Search Warrant to Court Ready Paperwork" at the Federal Law Enforcement Training Center in Glynco, Georgia this week.  

Read More

Don't Forget RAM Capture: A Key to Digital Forensics

April 20, 2018

Digital forensic experts understand the importance of remembering to perform a RAM Capture on-scene so as to not leave valuable evidence behind. Capturing volatile data in a computer's memory dump enables investigators and examiners to do a full memory analysis and access data including:

Read More

Get Your News (once a month)

Posts by Tag

See all

Recent Posts

CustomButton
  • READY TO ACCELERATE YOUR DIGITAL INVESTIGATIONS?

", css: '', target: '#hs_form_target_module_152512477666343_blog_subscribe_1', formData: { cssClass: 'hs-form stacked' } });