Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Nuix promotes key executives Jim Kent and Deborah Baron

Nuix, a worldwide provider of information management technologies, announced it has promoted key executives Jim Kent and Deborah Baron as part of a significant realignment of the company’s resources. The company has created four dedicated business units: Information Governance and

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Extracting data from damaged mobile devices

by Igor Mikhaylov For the last few years we have successfully extracted data from various mobile device, such as cell phones, smartphones, tablets, etc. Among devices to be examined, we came across defective mobile devices (damaged mechanically, by fire or

Interview with Kathryn Seigfried-Spellar, University of Alabama

Your research focuses on the relationship between personality and deviant computer use. How did you become interested in this as a topic? This question is always the first thing people ask me – It’s as if they want to know,

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums IOS forensic acquisition tool Waterboard is causing controversy, both for its name and its claims of acquiring cellular data. A BBC article about the “chaotic forensic landscape” provokes

iOS Artifacts – See What You Might Be Missing!

Lance Mueller of Magnet Forensics earlier posted an article on iOS forensics detailing common steps and details of an examination of an iOS device, and how IEF can be used once you have that physical image or file system dump.

BlackBag Technologies: BlackLight(R) 2013 R2 Software Release

BlackBag Technologies, Inc., a leading developer of forensics software and training solutions, today announced the immediate availability of BlackLight 2013 R2, a comprehensive iPhone, iPad, Mac OS X, and Windows forensic analysis tool. This latest release includes improved data search

Interview with Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information

Convert X-Ways TSV data into TLN data for IEF Timeline

Jad Saliba, Founder & CTO of Magnet Forensics, writes: We’re pleased to announce a new free tool and a guest blog post from James Morris of the Queensland Police Service in Australia. James came to me with a request to

Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information

Forensic Explorer fast shadow copy access added

Australian software company GetData Forensics adds Volume Shadow Copy analysis to Forensic Explorer. “Volume Shadow Copies are a potential gold mine for the forensic investigator” said GetData Managing Director John Hunter. “Until recent times they have often been overlooked due

Investigating iOS Phone Images, File Dumps and Backups

As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating system for mobile phones worldwide. Regardless of