Digital Forensics Round-Up, September 21 2023

A round-up of this week’s digital forensics news and views:


Android Now Harder To Crack Than IPhones: Forensics Detectives

A recent breakthrough in forensic technology has brought about a major shift in the constant battle between Android and iPhone security…

Read More (Cellular News)


Hi-tech police are on the trail of burglars’ ‘digital footprint’ that they leave behind at the scene

Police are to hunt down burglars by following the ‘digital footprints’ they leave behind at the scene for the first time. Officers will be told to track offenders by tracing the property they steal, such as mobile phones and cars…

Read More (Daily Mail)


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.


How Africa can address the issue of cybercrime

Cybercesurity and digital forensic experts propose a raft of measures that can be implemented by African governments to curb online attacks..

Read More (The Citizen)


Google Takeout Forensics: Unveiling the Secrets

When forensic experts are tasked with Google Takeout forensics or Gmail Email Forensics analysis, they often use a Google export utility known as Google Takeout…

Read More (MailXaminer)


Interview: Andrew Carr, Director of Cybersecurity Graduate Programs, Utica University

Andrew Carr, MS, GCIH, CTCE is the Director of Cybersecurity Graduate programs and Assistant Professor of Cybersecurity at Utica University…

Read More (Forensic Focus)


Remote collection of Windows Forensic Artifacts using KAPE and Microsoft Defender for Endpoint.

In this blog, I will demonstrate how you can remotely collect windows forensic artifacts/triage image using KAPE and Microsoft Defender for Endpoint…

Read More (Medium)


Artificial Intelligence Making Cyber Crime Harder to Fight

The rise of artificial intelligence brings tools that help cyber criminals clean up language, opening new doors for hackers to break into networks through emails that trick recipients into sharing personal info…

Read More (Government Technology)


iOS System Artifacts: Revealing Hidden Clues

When conducting a digital investigation, application artifacts like chats and browsers are usually the first in line to explore. With iOS devices, however, system files have great potential, too…

Read More (Belkasoft)


Super Resolution from Different Perspectives

This week we are going to expand on the concept of stabilization and frame integrationand discuss how we need to apply a perspective stabilization and super resolution in order to clarify a planar surface (such as a license plate) when it is changing its angle and/or distance to the camera lens…

Read More (Amped Software)


Cybersecurity Romance – Honeypots

A honeypot is a commonly employed tool by cybersecurity specialists to defend against cyber attackers (i.e., hackers)…

Read More (Robert Vanwey)

Leave a Comment

Latest Videos

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.

Latest Articles