UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

And there he stood, with a smoking datum in his hand

In early December 2008, Clifford Lambert, a retired Los Angeles art dealer, received a call from a New York estate lawyer with news that surely made his 74-year-old heart leap. Lambert was due to inherit some valuable artwork, the man

Forensic Analysis of Windows Shellbags

While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation. In a nutshell, shellbags help track views, sizes and positions of a

Paraben Announces the Device Seizure Challenge

How long has it been since you’ve tried Device Seizure? With over 12 years of development exclusively as a forensic tool, the latest version of Device Seizure goes head-to-head with any tool available. We know you will love the new

Why Offender Profiling is Changing Thanks to Mobile Forensics

Mobile forensics has changed the methodology when it comes to offender profiling. The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities. This is

Computer Crime or Legitimate Research?

One researcher digs into Windows, discovers a flaw (and a fix), and receives $100,000 from Microsoft. Another, threatened with prosecution for alleged hacking, becomes despondent and takes his own life. At the Black Hat 2014 conference, an all-star panel discussed

Oxygen Forensic® Passware® Analyst Acquires Protected Mobile Devices Data

Oxygen Forensics announces the release of Oxygen Forensic® Passware® Analyst, a new mobile forensic tool integrating Oxygen’s award-winning acquisition and analytic tools with Passware’s password recovery and data extraction. The new tool integrates mobile acquisition, data extraction, password recovery and

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums. A forum member unearths a very old hard drive; how can it be analysed? Is it possible to retrieve IP information by logging into a Hotmail account? Forum

How to Analyze USB Device History in Windows

Whether you’re a corporate examiner working an intellectual property theft, or a law enforcement investigator searching for illicit images, most forensic examiners have investigated the USB device history of a computer. There are five key pieces of information that need

Tor attack may have unmasked dark net users

Developers of software used to access Tor – an otherwise hard-to-reach part of the internet – have disclosed that an attack on the network may have unmasked users for five months. The Tor Project said that it believed the assault