How to Search Images for Text Values Using OCR

Hello, everyone. Jordan here with the Oxygen Forensic training team. Today, I’m gonna show you how to search images for text values using optical character recognition. Let’s get started. In today’s video, I’ll be discussing what OCR is and providing… Read more

Hex Searching in Oxygen Forensic Detective

Hey there, detectives. Welcome to Oxygen Forensics How-To series, where your Oxygen Forensic training team will provide you with detailed insight into focused areas within Oxygen Forensic Detective. For this video, we are going to dive into using the Hex… Read more

DFRWS-EU 2022: The Future of Digital Forensics Is Now

An analog clock superimposed on a blue background showing hexadecimal code
Moving digital forensics forward in terms of methods and frameworks, as well as organizational and cross-cultural collaboration, was an overarching theme of this year’s European Union edition of the Digital Forensics Research Workshop (DFRWS).  After 40 years, mainstays like file… Read more

Python Scripting for File Filtering With FTK

This week, we’re combining Python and filtering for some forensic shenanigans on this week’s episode of FTK Feature Focus. Welcome to FTK Feature Focus. I’m Justin Tolman, the director of training over North America here at Exterro. And this week… Read more

Forging Trust in Digital Forensics as Technology Evolves

A person holding a tablet with brightly lit icons representing law, trust, compliance
February’s publications continued a trending topic in recent research: establishing reliability in forensic science as a whole, and digital forensics particularly. Even as some works explored the decryption of encrypted data, and the use of “hacked” data from encrypted devices,… Read more

A Deep Dive into Apple Keychain Decryption

When it comes to the forensic investigation of Apple devices, a Keychain analysis is of particular importance. Not only does Keychain contain passwords from websites and applications, but it can also provide computer forensics with access to the same user’s… Read more

Be That Trusted Advisor

A white businessman holds a tablet with a high customer satisfaction score
By Robert B. Fried, Senior Vice President, Sandline Global, Forensics & Investigations As forensic practitioners, we must do our best to stay ahead of ever-changing technology but sometimes we are thrown curve balls.  For example, taking a trip down memory… Read more

How To Check Video Integrity By Detecting Double Encoding With VPF Analysis

Topics Approaches to Integrity VerificationA Short Intro to Video CompressionThe Variation of Prediction FootprintDetecting Double Video Encoding Using the VPFExperiment With a Surveillance Video Introduction In this article, Amped Software will start by defining video integrity and mentioning possible approaches… Read more

Remote Acquisition With Magnet AXIOM Cyber

Hey, everyone, Trey Amick from Magnet Forensics here, and today I’m excited to walk through AXIOM Cyber’s network acquisition features. With the recent release of AXIOM Cyber we now have the ability to complete remote endpoint collections, as well as… Read more

Selective File Extraction With XRY

Hello, I’m Adam Fermin, a technical sales engineer here at MSAB. This short video is going to show you the benefits of using file selection when dealing with mobile device extractions. Selective file extraction is becoming more and more important… Read more