Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Why Use IEF to Search for Internet-Related Artifacts? Efficiency!

[Republished from the Magnet Forensics blog by Lance Mueller, Director of Forensics – Magnet Forensics (formerly JADsoftware).] Well, it’s day two for me at Magnet Forensics, and I thought I would take the opportunity to say “hello” to everyone and

Article: Interpretation of NTFS Timestamps

File and directory timestamps are one of the resources forensic analysts use for determining when something happened, or in what particular order a sequence of events took place. As these timestamps usually are stored in some internal format, additional software

Nuix upgrades philanthropic product Proof Finder

Nuix has released Proof Finder 4.2, delivering advanced new features for eDiscovery and investigation professionals. This upgrade extends Nuix’s partnership with Room to Read, a global non-profit organization that seeks to transform the lives of children in Asia and Africa

Mobile Device Geotags & Armed Forces

In recent years it has been noticeable that the amount of people carrying a smart phone has increased exponentially. This is down to their low price and availability; even children as young as 12 have a smart phone. However, most

Industry Veteran & Thought Leader Lance Mueller Joins Magnet Forensics Team

With a strong commitment to helping thousands of its customers in the world’s top law enforcement, military, government and corporate organizations recover data from a broad range of Internet-related communications, Magnet Forensics (formerly JADsoftware) has brought industry veteran and thought

Webinar (Mobile Forensics): MPE+ Android Malware Detection

Malware on computers can infect, transmit and “sell” personal data. Malware can also be used to “blame” and cast doubt on collected evidence in a computer examination. If this is the case, why aren’t these items being scanned when conducting

Interpretation of NTFS Timestamps

Introduction File and directory timestamps are one of the resources forensic analysts use for determining when something happened, or in what particular order a sequence of events took place. As these timestamps usually are stored in some internal format, additional

The ticking time bomb known as cloud forensics

We’ve seen the news reports with carloads of FBI agents, windbreakers and all, rushing into a business to seize paper records and servers. The evidence is analyzed later to prove a crime using computer forensics. However, the more likely use

Lee Reiber, Global Director of Mobile Forensics, AccessData

Lee, you previously worked in law enforcement and were the CEO of a prominent mobile phone training company. Can you tell us more about your background and how you came to work for AccessData? I worked in law enforcement for

Forensics Europe Expo Announce Free to Attend Workshop Programme for Visitors

Forensics Europe Expo, 24 – 25 April 2013, Olympia, London, sponsored by LGC Forensics, in Collaboration with Forensic Science Society and organised in partnership with The Investigator has been designed as the premier international forum for sourcing forensics products, equipment

INTERNET EVIDENCE FINDER Adds Mac OS X File System Support & Timeline Feature

With a strong commitment to helping thousands of its customers in the world’s top law enforcement, military, government and corporate organizations recover data from a broad range of Internet-related communications, Magnet Forensics (formerly JADsoftware) has launched v6.0 of its industry-leading

Belkasoft Releases Free Kernel-Mode Live RAM Capturing Tool

Belkasoft has released a new kernel-mode forensic tool to capture the content of the computer’s volatile memory. Belkasoft RAM Capturer offers forensic specialists the ability to take snapshots of the computer’s volatile memory (“memory dumps”) even if an anti-dumping protection