Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

Philip Anderson, Northumbria University

Philip, can you tell us something about your background and why you decided to teach digital forensics? I graduated from Northumbria University with a BSc (Hons) in Business Information Technology in 1997 and gained an MSc in Distance Education with

Android Forensics

Smartphones are changing the IT and Communication landscape vastly.  A Smartphone can do almost every good thing a computer can do. Today most of the corporate employee access and manage their official emails through the e-mail client installed on their

Collecting and Processing Bloomberg Data

A few years ago, Bloomberg data may have been relatively unusual, however today we see Bloomberg chat and email data being collected quite frequently. Not a surprise really considering some of the headlines relating to certain Banks and Financial institutions

IEF Adds Webpage Re-building and Support for iOS Backups in Latest Upgrade

With a strong commitment to helping thousands of its customers in the world’s top law enforcement, military, government and corporate organizations retrieve Internet-related communications from a broad range of artifacts, Magnet Forensics (formerly JADsoftware) has unveiled v5.6 of its industry-leading

Digital forensics: proactive or reactive?

For a number of years digital forensics has referred to ‘the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law’. While collecting this digital evidence, to be used retrospectively in subsequent

IPOD – Timestamps secrets

ABSTRACT This is a description how the Apple Ipod/Iphone stores the timestamps into their plist files. After an experiment we tried to order the various ways that Apple Idevices manage and store these data. We found the timestamps into PlayCounts.plist

PFIC Registration Open – The Mountains are Calling!

Paraben's Forensic Innovations Conference is being held in Park City, Utah November 3-6. Join us for bootcamps, lectures, and labs from the industry’s top experts and learn the latest innovations in digital forensics. Whether you are just getting started in

Windows 8 Forensics webinar – alternative URL

Sincere apologies to anyone having difficulty connecting to the Meetingburner service to view the Windows 8 Forensics presentation – please try the following URL on YouTube instead: http://youtu.be/uhCooEz9FQs Josh is available in the webinars forum to answer any questions. Please

Webinar: Windows 8 Forensics – last chance to register

There are currently just over 30 places left before we reach our maximum of 1000 attendees for Josh Brunty’s Windows 8 Forensics webinar. Please register now at http://forensicfocus.enterthemeeting.com/m/JXI8IWVX if you wish to attend. Date: TodayTime: 11AM EDT US / 4PM

New Linux Distro for Mobile Security, Malware Analysis, and Forensics

by Jay Turla, a contributor to InfoSec Resources. A new GNU/Linux distribution or distro designed for helping you in every aspect of your mobile forensics, mobile malware analysis, reverse engineering and security testing needs and experience has just been released

Computer Analysts and Experts – Making the Most of GPS Evidence

The many companies that sell software for computer forensics have developed products for analysing satellite navigators. Police high tech crime units and independent laboratories now use this software on an industrial scale. Computer technicians conduct the analyses. This is home

Computer Analysts and Experts – Making the Most of GPS Evidence

by Professor David Last www.professordavidlast.co.uk The many companies that sell software for computer forensics have developed products for analysing satellite navigators. Police high tech crime units and independent laboratories now use this software on an industrial scale. Computer technicians conduct

Will Digital Forensics Crack SSD’s?

by Mike Sheward, a contributor to InfoSec Resources. Digital forensics is one of the most interesting and exciting fields of information security that you can ever be fortunate enough to work in, but not for the reasons you might expect.

Generating computer forensic supertimelines under Linux

When the authors first published this paper, their intentions were to develop a comprehensive guide to digital forensic timelines in order to consolidate the many fragmented sources of information concerning this topic. What they discovered, however, was that quality references

Evernote from a Forensic Investigation Perspective

by Stuart Clarke, Millnet Recently we have been looking at Evernote from a forensic investigation perspective, as we feel it is a great product which will grow in popularity therefore wanted to share some initial findings. While at the 2012