UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

IntaForensics Announces Lima Lite 20% Pre-Launch offer!

IntaForensics Announces Lima Lite entry level Forensic Case Management for £695.00 + local taxes (less 20% pre-launch offer) including support and all updates for 1 year. A leap forward for sole digital forensic practitioners, incident response, cyber security teams, small

Forensic Control Reviews Latest Version of Internet Evidence Finder (IEF)

Internet Evidence Finder (IEF), the industry-leading forensic software from Magnet Forensics that recovers existing and deleted data from 220+ Internet-related artifacts has been reviewed by Jonathan Krause of Forensic Control. To read the full report and learn more about IEF’s

Article: Mobile Device Geotags & Armed Forces

In recent years it has been noticeable that the amount of people carrying a smart phone has increased exponentially. This is down to their low price and availability; even children as young as 12 have a smart phone. However, most

Why Use IEF to Search for Internet-Related Artifacts? Efficiency!

[Republished from the Magnet Forensics blog by Lance Mueller, Director of Forensics – Magnet Forensics (formerly JADsoftware).] Well, it’s day two for me at Magnet Forensics, and I thought I would take the opportunity to say “hello” to everyone and

Article: Interpretation of NTFS Timestamps

File and directory timestamps are one of the resources forensic analysts use for determining when something happened, or in what particular order a sequence of events took place. As these timestamps usually are stored in some internal format, additional software

Nuix upgrades philanthropic product Proof Finder

Nuix has released Proof Finder 4.2, delivering advanced new features for eDiscovery and investigation professionals. This upgrade extends Nuix’s partnership with Room to Read, a global non-profit organization that seeks to transform the lives of children in Asia and Africa

Mobile Device Geotags & Armed Forces

In recent years it has been noticeable that the amount of people carrying a smart phone has increased exponentially. This is down to their low price and availability; even children as young as 12 have a smart phone. However, most

Industry Veteran & Thought Leader Lance Mueller Joins Magnet Forensics Team

With a strong commitment to helping thousands of its customers in the world’s top law enforcement, military, government and corporate organizations recover data from a broad range of Internet-related communications, Magnet Forensics (formerly JADsoftware) has brought industry veteran and thought

Webinar (Mobile Forensics): MPE+ Android Malware Detection

Malware on computers can infect, transmit and “sell” personal data. Malware can also be used to “blame” and cast doubt on collected evidence in a computer examination. If this is the case, why aren’t these items being scanned when conducting

Interpretation of NTFS Timestamps

Introduction File and directory timestamps are one of the resources forensic analysts use for determining when something happened, or in what particular order a sequence of events took place. As these timestamps usually are stored in some internal format, additional

The ticking time bomb known as cloud forensics

We’ve seen the news reports with carloads of FBI agents, windbreakers and all, rushing into a business to seize paper records and servers. The evidence is analyzed later to prove a crime using computer forensics. However, the more likely use

Lee Reiber, Global Director of Mobile Forensics, AccessData

Lee, you previously worked in law enforcement and were the CEO of a prominent mobile phone training company. Can you tell us more about your background and how you came to work for AccessData? I worked in law enforcement for