Blue Light Wellbeing’s Support For Digital Forensic Investigators

Hero Image

Discover how tailored, culturally aware mental health support can help digital forensic investigators cope with the hidden trauma of their work....

Digital Forensics Round-Up, August 20 2025

Digital Forensics Round-Up, August 20 2025

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....read more

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Geo-tag Forensics

Introduction A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some extremely powerful tools available for extracting geo-tag information from geo-tagged images but the

Autopsy 3: Windows-based, Easy to Use, and Free

If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device. Or, maybe you associate it with a book that made references to

Autopsy 3: Windows-based, Easy to Use, and Free

If you are like many digital investigators, you’ve heard about the Autopsy™ digital forensics tool and associate it with a course that used Linux to analyze a device.  Or, maybe you associate it with a book that made references to

Cyber Crime & Warfare: Book Review

Between the ongoing revelations about NSA surveillance and the usual drumbeat of security warnings about everything from Android smartphones to cars, it’s a good time for a primer on what’s actually going on. This slim volume — in an All

Benjamin Fung, Associate Professor, McGill University

Benjamin, you're an Associate Professor of Information Studies at McGill University – can you tell us more about the role and how you entered academia? Certainly. As you say, I am currently an Associate Professor of Information Studies at McGill

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Nuix promotes key executives Jim Kent and Deborah Baron

Nuix, a worldwide provider of information management technologies, announced it has promoted key executives Jim Kent and Deborah Baron as part of a significant realignment of the company’s resources. The company has created four dedicated business units: Information Governance and

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Extracting data from damaged mobile devices

by Igor Mikhaylov For the last few years we have successfully extracted data from various mobile device, such as cell phones, smartphones, tablets, etc. Among devices to be examined, we came across defective mobile devices (damaged mechanically, by fire or

Interview with Kathryn Seigfried-Spellar, University of Alabama

Your research focuses on the relationship between personality and deviant computer use. How did you become interested in this as a topic? This question is always the first thing people ask me – It’s as if they want to know,

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums IOS forensic acquisition tool Waterboard is causing controversy, both for its name and its claims of acquiring cellular data. A BBC article about the “chaotic forensic landscape” provokes

iOS Artifacts – See What You Might Be Missing!

Lance Mueller of Magnet Forensics earlier posted an article on iOS forensics detailing common steps and details of an examination of an iOS device, and how IEF can be used once you have that physical image or file system dump.

BlackBag Technologies: BlackLight(R) 2013 R2 Software Release

BlackBag Technologies, Inc., a leading developer of forensics software and training solutions, today announced the immediate availability of BlackLight 2013 R2, a comprehensive iPhone, iPad, Mac OS X, and Windows forensic analysis tool. This latest release includes improved data search