Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day varied in content

New IEF/EnCase Processor Module Now Available

How Does Integration Help You as an Investigator? Let’s imagine you have been assigned to investigate a case involving an employee who is suspected of posting threatening comments on a co-worker’s Facebook account (this could either be an internal employee

Interview with Jacopo (forum member ‘jaclaz’)

You’re an active member of the Forensic Focus forums. How did you become interested in digital forensics? My interests are oriented towards OS booting, filesystems and data recovery. These fields are of course closely linked to digital forensics. I was

Jacopo (forum member ‘jaclaz’)

Jacopo, you’re currently a freelance technical consultant. Could you tell us a bit more about what the job entails, and how you got into it? It is difficult to describe the kind of activities I am involved with as there

From iPhone to Access Point – Analyzing the Evidence

A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi needs

Does Deviant Pornography Use Follow A Guttman-Like Progression?

This study investigated whether deviant pornography use followed a Guttman-like progression in that a person transitions from being a nondeviant to deviant pornography user. In order to observe this progression, 630 respondents from Survey Sampling International’s (SSI) panel Internet sample

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day varied in content

Geo-tag Forensics

A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some extremely powerful tools available for extracting geo-tag information from geo-tagged images but the insight

Does Deviant Pornography Use Follow A Guttman-Like Progression?

by Kathryn C. Seigfried-Spellar (a), Marcus K. Rogers (b) (a) The University of Alabama, Tuscaloosa, AL 35487, USA (b) Purdue University, West Lafayette, IN 47907, USA Abstract This study investigated whether deviant pornography use followed a Guttman-like progression in that

From iPhone to Access Point

Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi

Geo-tag Forensics

Introduction A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some extremely powerful tools available for extracting geo-tag information from geo-tagged images but the

Autopsy 3: Windows-based, Easy to Use, and Free

If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device. Or, maybe you associate it with a book that made references to

Autopsy 3: Windows-based, Easy to Use, and Free

If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device.  Or, maybe you associate it with a book that made references to

Cyber Crime & Warfare: Book Review

Between the ongoing revelations about NSA surveillance and the usual drumbeat of security warnings about everything from Android smartphones to cars, it’s a good time for a primer on what’s actually going on. This slim volume — in an All

Benjamin Fung, Associate Professor, McGill University

Benjamin, you're an Associate Professor of Information Studies at McGill University – can you tell us more about the role and how you entered academia? Certainly. As you say, I am currently an Associate Professor of Information Studies at McGill