Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

DigitalFIRE Mutual Legal Assistance Study

Please help DigitalFIRE Labs understand the current state of Mutual Legal Assistance Requests relating to digital evidence, and be entered for a chance to win a FIREBrick write-blocker or an Amazon gift card. The survey on Mutual Legal Assistance Requests

Passware Enhances FileVault2 Decryption, 2x faster GPU Performance

Mac FileVault2 passwords now recoverable at a high speed, in addition to Passware’s previously announced live memory analysis solution. Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery software for computer forensics, law enforcement organizations, government agencies,

Forensic Focus Forum Round-Up

What is the future of digital forensics? Chime in on the forum. Forum member joakims has provided an open-source example of how data can be hidden within NTFS system files. Interpreting shellbags using TZWorks can yield confusing results. Bypassing Android

Is Your Computer Forensics Investigation A Symphony Or A Circus?

Digital forensics is changing, and you should be prepared for more of it in the future, not less. The increase of cloud computing has, in some ways, reduced the instances of hard drive analyses, but the explosion in mobile devices

JOB VACANCY: Forensic Analysts – London, UK

IntaForensics have been operational since 2006 as a specialist service provider of digital forensics services. Our client base includes several large and small Police forces for whom we provide outsourced digital forensics, Criminal Legal defense solicitors and Litigation solicitors. Due

Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases

This article describes common approaches used for the recovery of cleared Skype histories and deleted chat logs, and discusses methods and techniques for recovering evidence from cleared and damaged SQLite databases. It is difficult to underestimate popularity of Skype. Hundreds

Forensic analysis of the ESE database in Internet Explorer 10

———————————————————— Due to me not being able to reformat our thesis in a good way I strongly suggest you look at the whole paper in PDF format here: http://hh.diva-portal.org/smash/get/diva2:635743/FULLTEXT02.pdf /Philip ———————————————————— Forensic analysis of the ESE database in Internet Explorer

JOB VACANCY: Forensic Services Director – £60k London, UK

Forensic Services Director (Executive) (Warwickshire & London Operations) (£60k + Share Option + Flexi Time + Private Health + Pension) IntaForensics are currently seeking a Board Executive to run and develop our Warwickshire and London operations. The successful candidate will

WhatsApp – discovering timestamps of deleted messages

ABSTRACT:  This is a procedure for locating and parsing deleted messages timestamps in Android WhatsApp database. I did a little reverse engineering, using the hexadecimal tool of Physical Analyzer (UFED by Cellebrite), of the database of the popular messaging app

Man In The Middle Attack: Forensics

Yes, that’s right! Mr. Upset did not post ‘I am hating my new job’ as it appears in Figure 2, instead he wrote ‘I am loving my new job’. Then how did it happen and who did it? This article

Webinar: Geolocation Artifacts and Timeline Analysis in Digital Forensics

Using Geolocation Artifacts and Timeline Analysis to Solve the Case: A Digital Forensics Case Study http://info.magnetforensics.com/Digital-Forensics-Case-Study-Webinar/ Date: Wednesday December 11, 2013Time: 11:00am GMT (6:00am EST)Duration: 60 mins In this webinar, Jad Saliba of Magnet Forensics will take you through a

Article: Windows 8 File History Analysis

File History is a new backup service introduced in Windows 8. By default this feature is off and to turn it on, user has to select a backup location – either a network drive or external storage media. Thus, it

Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection

Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and anti-malware tools must perform what is called, in forensic terms, “live box analysis”, performing a real-time scan of a live system. No wonder rootkits can

DFRWS Europe – 7-9 May 2014

DFRWS USA has a long history of being the foremost digital forensics research venue and has decided to hold a sister conference to bring the same opportunities to Europe. The first annual DFRWS EU conference will be held from May