Blue Light Wellbeing’s Support For Digital Forensic Investigators

Hero Image

Discover how tailored, culturally aware mental health support can help digital forensic investigators cope with the hidden trauma of their work....

Digital Forensics Round-Up, August 20 2025

Digital Forensics Round-Up, August 20 2025

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....read more

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Interview with Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information

Convert X-Ways TSV data into TLN data for IEF Timeline

Jad Saliba, Founder & CTO of Magnet Forensics, writes: We’re pleased to announce a new free tool and a guest blog post from James Morris of the Queensland Police Service in Australia. James came to me with a request to

Dr Kamil Reddy, Independent Consultant, South Africa

Kamil, you’re currently an independent consultant in digital forensics – can you tell us more about your work and how you first became interested in the field? My independent consulting has, to date, been predominantly in the fields of information

Forensic Explorer fast shadow copy access added

Australian software company GetData Forensics adds Volume Shadow Copy analysis to Forensic Explorer. “Volume Shadow Copies are a potential gold mine for the forensic investigator” said GetData Managing Director John Hunter. “Until recent times they have often been overlooked due

Investigating iOS Phone Images, File Dumps and Backups

As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating system for mobile phones worldwide. Regardless of

Interview with Jim Grady, President, Cellebrite USA

Jim, please tell us a bit about yourself and your background before joining Cellebrite. I´ve been involved in the wireless industry as an executive for over 20 years, both on the carrier side and the vendor side. Prior to Cellebrite,

UK ‘losing fight’ against internet crime, warn MPs

The UK must do more to stop online fraud and deter state-sponsored cyber-espionage or risk losing the fight against e-crime, MPs have warned. The Home Affairs Select Committee said much low-level internet-based financial crime was falling into a “black hole”

Jim Grady, President, Cellebrite USA

Jim, please tell us a bit about yourself and your background before joining Cellebrite. I´ve been involved in the wireless industry as an executive for over 20 years, both on the carrier side and the vendor side. Prior to Cellebrite,

Scientist banned from revealing codes used to start luxury cars

A British-based computer scientist has been banned from publishing an academic paper revealing the secret codes used to start luxury cars including Porsches, Audis, Bentleys and Lamborghinis as it could lead to the theft of millions of vehicles, a judge

UK government to ‘drain the market’ of online child sex abuse

The government plans to “drain the market” of child sexual abuse images online by launching a campaign with the police and internet companies to pursue both the publishers and those who access the material, David Cameron has said. The prime

“Oh no, the suspect ran CCleaner to get rid of the evidence!”

“I recently received a few questions about the effects of running Internet history sanitation tools such as CCleaner, when examining a computer looking for internet related artifacts. CCleaner is freely available online and commonly used to ‘sanitize’ user activity. From