UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

What’s Happening In Forensics

Sarah Edwards shares her presentation ‘Watching the Watchers‘ from Objective by the Sea. Ariel Watson discusses what blockchain means for digital evidence sharing. Bryan Ambrose demonstrates how to restore Windows sticky notes from volume shadow copies. The Digital Investigations Conference

From Crime To Court: Review Principles For UK Disclosure

by Hans Henseler UK Law Enforcement agencies are facing significant challenges related to digital evidence disclosure in criminal prosecution cases. Suspects who are charged with a crime must have access to all relevant evidence to ensure a fair trial, even

From Crime To Court: Review Principles For UK Disclosure

by Hans Henseler UK Law Enforcement agencies are facing significant challenges related to digital evidence disclosure in criminal prosecution cases. Suspects who are charged with a crime must have access to all relevant evidence to ensure a fair trial, even

What’s Happening In Forensics

Chris Dale interviews Julia Helmer of Consilio about mobile data. A new fingerprinting technique developed by researchers at the University of Cambridge allows websites to uniquely identify phones based on data from the accelerometer, gyroscope, and magnetometer sensors. John Patzakis

Oxygen Forensics Announces Facial Recognition

Oxygen Forensics, a leading global provider of digital forensic investigation software to law enforcement, government, and enterprise organizations, announced its strategic partnership with Rank One Computing, a leading provider of facial recognition and biometrics technology.Rank One’s facial recognition technology will

What’s Happening In Forensics

Amped posted a blog about how to deal with interlaced videos in Amped FIVE. Alexis Brignoni demonstrates how to find Badoo chats in Android using SQL queries and the MAGNET App Simulator. Hexacorn plays with delay-loaded DLLs. Harlan Carvey talks

What’s Happening In Forensics

Techno Security MB is under way – keep up to date on Twitter. Binary Hick gives us an in-depth look at Snapchat on Android. Ali Hadi looks at Windows InstallTime vs InstallDate registry values. Foursquare has acquired Placed, meaning it

What’s Happening In Forensics

BlackBag Tech have announced that MacQuisition can now produce decrypted physical images of Apple’s latest systems using the T2 chip. Find Ashley Hernandez’s demonstration here. Didier Stevens has updated hex-to-bin.py to Version 0.0.2, which comes with an option to parse

Interview With Kim Hyun-soo, CEO, HancomGMD

Tell us a bit about your role: what does a day in your life look like? I am Kim Hyun-soo, a founder of HancomGMD. Over the years, my daily routine has been very focused on the sole purpose of making

Kim Hyun-soo, CEO, HancomGMD

Tell us a bit about your role: what does a day in your life look like? I am Kim Hyun-soo, a founder of HancomGMD. Over the years, my daily routine has been very focused on the sole purpose of making

What’s Happening In Forensics

Hexacorn suggests that the Run key in the Windows registry could be interesting for forensic investigators to look at. Harlan Carvey wrote a post discussing troubleshooting and deep knowledge, or what to do when a tool that we’re using doesn’t

The Opportunity In The Crisis: ICS Malware Digital Forensics

by Christa Miller, Forensic Focus Malware aimed at industrial control systems (ICS) is nothing new. Nearly 10 years have passed since Stuxnet first targeted the supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs) associated with centrifuges

What’s Happening In Forensics

The Byton M-Byte is “a premium vehicle, the crowning glory of which is an enormous 4K screen that spreads across the full width of the dashboard, eliminating the need for conventional instruments and dials.” A great repository of information for