UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Cyber Crime & Warfare: Book Review

Between the ongoing revelations about NSA surveillance and the usual drumbeat of security warnings about everything from Android smartphones to cars, it’s a good time for a primer on what’s actually going on. This slim volume — in an All

Benjamin Fung, Associate Professor, McGill University

Benjamin, you're an Associate Professor of Information Studies at McGill University – can you tell us more about the role and how you entered academia? Certainly. As you say, I am currently an Associate Professor of Information Studies at McGill

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Nuix promotes key executives Jim Kent and Deborah Baron

Nuix, a worldwide provider of information management technologies, announced it has promoted key executives Jim Kent and Deborah Baron as part of a significant realignment of the company’s resources. The company has created four dedicated business units: Information Governance and

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Cyberbullying – a growing concern in a connected society

Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and implemented them into a commercially available forensic tool. The tool

Extracting data from damaged mobile devices

by Igor Mikhaylov For the last few years we have successfully extracted data from various mobile device, such as cell phones, smartphones, tablets, etc. Among devices to be examined, we came across defective mobile devices (damaged mechanically, by fire or

Interview with Kathryn Seigfried-Spellar, University of Alabama

Your research focuses on the relationship between personality and deviant computer use. How did you become interested in this as a topic? This question is always the first thing people ask me – It’s as if they want to know,

Forensic Focus Forum Round-Up

Welcome to this round-up of recent posts to the Forensic Focus forums IOS forensic acquisition tool Waterboard is causing controversy, both for its name and its claims of acquiring cellular data. A BBC article about the “chaotic forensic landscape” provokes

iOS Artifacts – See What You Might Be Missing!

Lance Mueller of Magnet Forensics earlier posted an article on iOS forensics detailing common steps and details of an examination of an iOS device, and how IEF can be used once you have that physical image or file system dump.

BlackBag Technologies: BlackLight(R) 2013 R2 Software Release

BlackBag Technologies, Inc., a leading developer of forensics software and training solutions, today announced the immediate availability of BlackLight 2013 R2, a comprehensive iPhone, iPad, Mac OS X, and Windows forensic analysis tool. This latest release includes improved data search

Interview with Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information

Convert X-Ways TSV data into TLN data for IEF Timeline

Jad Saliba, Founder & CTO of Magnet Forensics, writes: We’re pleased to announce a new free tool and a guest blog post from James Morris of the Queensland Police Service in Australia. James came to me with a request to

Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information