Join Us!

Industry Roundup: Cloud Forensics

by Christa Miller

Only a few short years ago, the idea of recovering forensic data from the cloud seemed like either troubling overreach, or unnecessarily redundant given the availability of evidence from mobile devices.

As encryption became more prevalent on Read more

How To Parse AirDrop Artifacts In Magnet AXIOM

Hey everyone, Trey Amick from Magnet Forensics here. Today we’re going to be looking at a new set of artifacts specific to Mac investigations, which will be released as part of the AXIOM 3.8 release.

Today we’re going to be … Read more

Investigating Nonconsensual Intimate Image Sharing

by Christa Miller, Forensic Focus

Nonconsensual intimate image sharing – also known as image-based sexual abuse, nonconsensual pornography, or its original slang, “revenge porn” – has been around since at least the 1980s, but didn’t become a widespread social problem Read more

How To Extract Credential Data Using KeyScout

Hello, this is Keith Lockhart from Oxygen Training, and this video is going to discuss the KeyScout application.

The KeyScout application is one of the tools available in the tool suite concept of the Forensic Detective product. KeyScout is a … Read more

Walkthrough: VFC From MD5

VFC was first launched to the forensic community in 2007. It makes it easy to create a virtual machine (VM) replica of a target system, enabling an investigator to recreate and interact with the “digital crime scene”. 

Using accepted forensic Read more