Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and… Read more
A round-up of this week’s digital forensics news and views:
Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches
In this study, we propose a forensic-forgery detecting approach for audio files, an extension of previous research on… Read more
Forensic Focus has reported before on the impact of cyber investigations on the mental health of digital forensic experts, particularly those who spend time analysing crimes involving child sexual abuse material (CSAM). Psychologists have known for many years that police… Read more
Alex Desmond: Welcome, everyone, to another Forensic Focus. It’s evening for myself, morning for Si, and we’re joined by Chris Doman who is also in the UK, a nice bright early morning for him, as well. He’s from… I should… Read more
A round-up of this week’s digital forensics news and views:
LockBit ransomware group back online after international police disruption
Russian-based ransomware gang, Lockbit, said it has restored its servers and is back online following an international police operation last week… Read more
The Techno Security and Digital Forensics Conference returns to Wilmington, North Carolina June 4-6 to host its 25th Anniversary edition of the flagship East coast event. The conference maintains its tradition of delivering a top-tier lineup of topics and speakers… Read more
FF: Could you start by telling us a bit about yourself and why you decided to study for a master’s in digital Forensics at Cranfield University?
Thank you for the opportunity to introduce myself. I’m Shwetha Krishna, and I’ve completed… Read more
A round-up of this week’s digital forensics news and views:
How to Identify and Investigate AI Audio Deepfakes, a Major 2024 Election Threat
In October 2023, an AI-synthesized impersonation of the voice of an opposition leader helped swing the election… Read more
Fake images have been in the news recently due to the Taylor Swift case, in which tools such as Microsoft’s text-to-image generator Designer were hacked by a Telegram group known for posting abusive images of women online. Fake images of… Read more
FF: Tell us about your background and how you came to be in your current role at Swiss FTS.
Before discussing my journey and project related to the investigation of iOS Unified Logs, I would like to express my gratitude… Read more
Nick Harvey, a former Detective Inspector in the Metropolitan Police, discusses his transition from law enforcement to his current role as a Customer Success Manager at Cellebrite. He describes his experience in tackling county lines, a form of organized crime… Read more
It goes without saying that digital forensics is a high stakes area, and it is therefore crucial for both data and methodology to be as rigorous as possible. Errors in process or in information can be catastrophic – but what… Read more
Si: So friends and the enemies, welcome to the Forensic Focus podcast. Owing to the vagaries of the way the sausage factory works, this is actually our first recording for 2024, and we are delighted today to have Alan Platt… Read more
A round-up of this week’s digital forensics news and views:
A forensic framework to improve digital image evidence administration in IIoT
The extensive growth of Industrial Internet of Things (IIoT) has prompted cyber attackers to commence a variety of attacks… Read more
Read our digest of the latest content on the Forensic Focus website, including news, reviews, podcasts, articles, how-to videos and more.… Read more
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.