Blue Light Wellbeing’s Support For Digital Forensic Investigators

Hero Image

Discover how tailored, culturally aware mental health support can help digital forensic investigators cope with the hidden trauma of their work....

Digital Forensics Round-Up, August 20 2025

Digital Forensics Round-Up, August 20 2025

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....read more

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Interview with John Huperetes, Senior Forensics Instructor

John Huperetes is a sub-contractor to the US Department of Defense and any views herein do not represent those of his contractor or of the DoD. John, please tell us about your current role. I am contracted to be “senior

John Huperetes, Senior Forensics Instructor

John Huperetes is a sub-contractor to the US Department of Defense and any views herein do not represent those of his contractor or of the DoD. John, please tell us about your current role. I am contracted to be “senior

Arsenal Image Mounter now available on GitHub

Arsenal Image Mounter is now available on GitHub under a dual license. Arsenal Imager Mounter is the image mounter/physical disk driver used by Registry Recon to mount forensic images as physical disks and includes a complete virtual SCSI adapter which

Interview with Benjamin Fung, Associate Professor, McGill University

Your research focuses on designing intelligent systems for the purpose of crime investigation. How did you become interested in these topics? After joining the Computer Security team at Concordia in 2007, I had a lot of opportunities to interact with

Forensic Focus Forum Round-Up

How much does having a disability affect working in forensics? Chime in on the forum. Are Facebook private messages retrievable? Forum members discuss the best way to clean flash drives. To triage or not to triage? That is the question.

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day varied in content

New IEF/EnCase Processor Module Now Available

How Does Integration Help You as an Investigator? Let’s imagine you have been assigned to investigate a case involving an employee who is suspected of posting threatening comments on a co-worker’s Facebook account (this could either be an internal employee

Interview with Jacopo (forum member ‘jaclaz’)

You’re an active member of the Forensic Focus forums. How did you become interested in digital forensics? My interests are oriented towards OS booting, filesystems and data recovery. These fields are of course closely linked to digital forensics. I was

Jacopo (forum member ‘jaclaz’)

Jacopo, you’re currently a freelance technical consultant. Could you tell us a bit more about what the job entails, and how you got into it? It is difficult to describe the kind of activities I am involved with as there

From iPhone to Access Point – Analyzing the Evidence

A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi needs

Does Deviant Pornography Use Follow A Guttman-Like Progression?

This study investigated whether deviant pornography use followed a Guttman-like progression in that a person transitions from being a nondeviant to deviant pornography user. In order to observe this progression, 630 respondents from Survey Sampling International’s (SSI) panel Internet sample

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day varied in content

Geo-tag Forensics

A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some extremely powerful tools available for extracting geo-tag information from geo-tagged images but the insight

Does Deviant Pornography Use Follow A Guttman-Like Progression?

by Kathryn C. Seigfried-Spellar (a), Marcus K. Rogers (b) (a) The University of Alabama, Tuscaloosa, AL 35487, USA (b) Purdue University, West Lafayette, IN 47907, USA Abstract This study investigated whether deviant pornography use followed a Guttman-like progression in that

From iPhone to Access Point

Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi