Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Hero Image

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Crimes Against Children Conference 2019 Recap Part II: Digital Evidence

By Christa Miller, Forensic Focus Our first article in this two-part series focused on the technology associated with crimes against children: mobile peer-to-peer software; cryptocurrency used to buy and sell child sexual abuse material (CSAM); the virtual worlds where abuse

TikTok Data Extraction In Oxygen Forensic Detective

What is it? TikTok, an emerging app is rapidly gaining popularity. It recently unseated Instagram, YouTube and Snapchat as the top free app in Apple’s App Store . As of Nov. 6 2018, according to industry research firm App Annie,

Comprehending The IoT Cyber Threat Landscape

Morteza Safaei Pour shares his research at DFRWS EU 2019. Morteza: Hello and good morning – my name is Morteza Safaei Pour, from CTI Lab Florida Atlantic University. Today I’m going to talk about comprehending the IoT cyber threat landscape,

Comprehending The IoT Cyber Threat Landscape

Morteza Safaei Pour shares his research at DFRWS EU 2019. Morteza: Hello and good morning – my name is Morteza Safaei Pour, from CTI Lab Florida Atlantic University. Today I’m going to talk about comprehending the IoT cyber threat landscape,

Unlock Mobile Devices Using These Popular Codes

We have collected thousands of pattern lock codes for Android using our Burner Breaker technology and we have discovered the top gesture codes used to UNLOCK Android devices. For example, the most popular pattern lock code is 3 2 5

Webinar: Timesaving Forensic Techniques For Your Next Case

A new webinar, Timesaving Forensic Techniques For Your Next Case, is available to view here. Join the forum discussion here.View the webinar on YouTube here.Read a full transcript of the webinar here. Read More

Timesaving Forensic Techniques For Your Next Case

Join the forum discussion here.View the webinar on YouTube here.Read a full transcript of the webinar here. Julie O’Shea: Hi everyone, thanks for joining today’s webinar: Timesaving Forensic Techniques For Your Next Case. My name is Julie O’Shea, and I’m

Clearing The Way With Magnet OUTRIDER

Magnet Forensics is proud to introduce Magnet OUTRIDER — a new and easy way for officers and investigators to check devices for digital contraband. OUTRIDER is an intuitive preview tool that quickly scans smartphones and computers to determine if there

What Changes Do We Need To See In eDiscovery? Part III

by Harold Burt-Gerrans At the end of Part 2, I put forth an argument that de-duplication should always be done globally to bring the data set down to just unique documents. And now that you’re convinced (or should have been)

What Changes Do We Need To See In eDiscovery? Part III

by Harold Burt-Gerrans Duplicative Documents At the end of Part 2, I put forth an argument that de-duplication should always be done globally to bring the data set down to just unique documents. And now that you’re convinced (or should

Crimes Against Children Conference 2019 Recap Part I: Technology

by Christa Miller, Forensic Focus Celebrating its 31st year, the Crimes Against Children Conference ran from 12-15 July 2019 in Dallas, Texas. The conference kicked off with opening remarks by Lynn M. Davis, President and Chief Executive Officer of the