UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

EnCase 7.10: Better Visibility, Simpler Reporting, More Flexible

For more than 15 years, EnCase has empowered investigators by exposing data invisible to most tools and putting this data at the investigator’s fingertips with flexible, accessible analysis and reporting. EnCase 7.10 is built to continue this tradition. EnCase 7.10

PFIC Agenda Announced: Innovation is King at PFIC 2014

Paraben has announced the agenda for PFIC 2014. The popular digital forensics conference runs November 12-14, 2014 at Snowbird, Utah. PFIC has a successful mix of lectures, labs, and training sessions. In addition the event is known to have some

The Complete Workflow of Forensic Image and Video Analysis

In this article we’ll describe the complete workflow for image and video forensics. In fact, just like computer forensics in not only dumb copying and looking at files, forensic video analysis is broad and complex and there are many steps

Investigating the Dark Web

The recent rise in the number of people who suspect they may be being tracked on the internet, whether by government agencies, advertisers or nefarious groups, has led to increased interest in anonymising services such as TOR. TOR, or The

Cloud Computing Stymies Digital Forensics Investigations

In recent years, cloud computing has made the leap from an emerging technology to government mainstay, allowing agencies an IT avenue to share services, save money and increase efficiency. However, cloud computing still presents some major technical challenges in government,

The Complete Workflow of Forensic Image and Video Analysis

In this article we’ll describe the complete workflow for image and video forensics. In fact, just like computer forensics is not only simply copying and looking at files, forensic video analysis is broad and complex and there are many steps

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums. Forum members discuss the best way to retrieve Facebook profile data. What does it mean when a mail header shows two X-Originating IP addresses? Forensic imaging of a

Dark net ‘used by tens of thousands of paedophiles’

Tens of thousands of paedophiles are using the so-called dark net to trade images of sexual abuse, an investigation by BBC News indicates. One site receives as many as 500 page views per second, its founder says. Figures from another

Finding and Analyzing Document Files with IEF

Analyzing documents to prove their authenticity has been one of the cornerstones of computer forensics and is still an important part of the investigative process to this day. Whether you’re investigating documents in a fraud case, an IP theft, or