DFRWS-EU 2022: The Future of Digital Forensics Is Now

An analog clock superimposed on a blue background showing hexadecimal code

Moving digital forensics forward in terms of methods and frameworks, as well as organizational and cross-cultural collaboration, was an overarching theme of this year’s European Union edition of the Digital Forensics Research Workshop (DFRWS). 

After 40 years, mainstays like file … Read more

Python Scripting for File Filtering With FTK

This week, we’re combining Python and filtering for some forensic shenanigans on this week’s episode of FTK Feature Focus.

Welcome to FTK Feature Focus. I’m Justin Tolman, the director of training over North America here at Exterro. And this week … Read more

Forging Trust in Digital Forensics as Technology Evolves

A person holding a tablet with brightly lit icons representing law, trust, compliance

February’s publications continued a trending topic in recent research: establishing reliability in forensic science as a whole, and digital forensics particularly. Even as some works explored the decryption of encrypted data, and the use of “hacked” data from encrypted devices, … Read more

A Deep Dive into Apple Keychain Decryption

When it comes to the forensic investigation of Apple devices, a Keychain analysis is of particular importance. Not only does Keychain contain passwords from websites and applications, but it can also provide computer forensics with access to the same user’s Read more

Be That Trusted Advisor

A white businessman holds a tablet with a high customer satisfaction score

By Robert B. Fried, Senior Vice President, Sandline Global, Forensics & Investigations

As forensic practitioners, we must do our best to stay ahead of ever-changing technology but sometimes we are thrown curve balls.  For example, taking a trip down memory … Read more

Remote Acquisition With Magnet AXIOM Cyber

Hey, everyone, Trey Amick from Magnet Forensics here, and today I’m excited to walk through AXIOM Cyber’s network acquisition features. With the recent release of AXIOM Cyber we now have the ability to complete remote endpoint collections, as well as … Read more

Selective File Extraction With XRY

Hello, I’m Adam Fermin, a technical sales engineer here at MSAB. This short video is going to show you the benefits of using file selection when dealing with mobile device extractions.

Selective file extraction is becoming more and more important … Read more

Magnet OUTRIDER 3.0 Triage for macOS

Hey everyone, Trey Amick from Magnet Forensics, and today I want to highlight Magnet OUTRIDER version 3.0. If you may have noticed I’m not triaging a Windows box today, that’s right, version 3.0 of OUTRIDER is a purpose-built triage tool … Read more

Merged Extractions in Oxygen Forensic Detective

Hey everyone. It’s Amanda Mahan from Oxygen Forensics training team. I’m going to go over a new feature that Oxygen Forensic Detective Version 14 and up now has, it is the Merged Extractions Tool. With this tool, you can now … Read more

Examining Vehicle Data With Magnet AXIOM

Hi, this is Kim Bradley with Magnet Forensics. Today, we’ll be learning how to process vehicle data by using an exported extraction from Berla’s iVe software. 

First, to get the extraction you’ll need to export using iVe. You can do … Read more

Share to...