UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Deleted File Fragment Dating By Analysis Of Allocated Neighbors

Ahmed Bajat shares his research at DFRWS EU 2018.Ahmed: Thank you. My name is Ahmed Bahjat, I am here from George Mason University – shoutout to Jessica Hyde. I’ll be talking about file fragments dating; this is probably your first

Digital Forensic Techniques To Investigate Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective. Finding evidence that a password management

Digital Forensic Techniques To Investigate Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective. How Password Managers Can Be Investigated

Password Trends 2019

The Passware team has analyzed over 4 billion real user passwords and gathered data on the latest trends on password use. ABOUT THE RESEARCH As sources of passwords, we have merged leaked passwords databases available over the internet, passwords recovered

Forensic Extraction Of Data From Mobile Apple Devices

This article examines the fundamentals of a forensic examination covering Apple mobile devices. A step-by-step guide describing the process of forensic data extraction and analysis exemplified by Apple mobile devices (iPhone) will be given below. This article will also familiarize

How To Digital Forensic Boot Scan A Mac With APFS

by Rich Frawley In this short 3-minute video, ADF’s digital forensic specialist Rich Frawley shows how to boot a MacBook Air (APFS, non-encrypted) with Digital Evidence Investigator. The ADF digital forensic team is hard at work putting the finishing touches

How To Digital Forensic Boot Scan A Mac With APFS

by Rich Frawley  In this short 3-minute video, ADF’s digital forensic specialist Rich Frawley shows how to boot a MacBook Air (APFS, non-encrypted) with Digital Evidence Investigator. The ADF digital forensic team is hard at work putting the finishing touches

What’s Happening In Forensics – Dec 2, 2019

Tim Bienvenu-Bate shows how to record video evidence with DME Forensics. Sofia Björketun from MSAB demonstrates some of the features of XAMN Elements and shows how it has replaced XACT.

Semantics 21 Welcomes New Director Of Business Development

Semantics 21® are pleased to announce the appointment of Mr. Stuart Hutchinson as the new Director of Business Development. Stuart joins Semantics 21, the developers of the multi-award winning S21® LASERi® Suite who won the 2019 Queen’s Award for Enterprise:

Belkasoft’s Webinar On New Ways To Acquire iOS Devices With BEC

Join the upcoming webinar to learn new ways to acquire iOS devices with Belkasoft Evidence Center. Brad Robin, Belkasoft’s Pre-Sales Manager and law enforcement professional, will hold a special talk dedicated to ‘Acquisition of iOS devices with Belkasoft Evidence Center