Digital Forensics Round-Up, August 20 2025

Hero Image

Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more....

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Wrapping Up The S21 Transcriber Spotlight Session – What We’ve Covered

Explore S21 Transcriber: a fully offline, court-ready tool with free 30-day access and training....read more

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....read more

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Forensic Toolkit v3 Tips and Tricks ― Not on a Budget

A couple of weeks ago, Brian Glass posted a very helpful comment, Forensic Toolkit v3 Tips and Tricks — on a Budget.  His comment focused on how to “get close to SSD performance on the cheap” and he discussed the

iPhone Tracking – from a forensic point of view

– Introduction – iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all around the globe. People stated, that there is

Android Forensics Study of Password and Pattern Lock Protection

Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Password Lock Protection and find out what it has in common with Pattern Lock. And finally we’ll try to understand 

Mike’s Forensic Tools – Cookie Cutter

A simple app to decode the data held within Google Analytics Cookies. The data can be identified by “__UTM” starting each section. The data holds: records, the number of visits to a website, the first, last and current visit dates;

Publishing articles at Forensic Focus

Forensic Focus is always keen to publish articles, papers or blog posts of interest to the digital forensics community. Articles are published not only online but also included in the monthly newsletter (sent to over 12,00 subscribers) and promoted via

SC Suite v4.4 Released.

A new version of SC Suite is available, version 4.4 now includes more tools to analyse and extract information from a variety of file types and utilities to assist in every day tasks. Continuing user feedback has resulted in the

DFCB Announces Q4 Deadline for Applications

The Digital Forensics Certification Board (DFCB) has announced that its next application deadline for its Digital Forensics Certified Practitioner (DFCP) designation is December 2, 2011. The DFCB currently accepts applications four times a year. To obtain detailed certification information and

SQLite Forensic Reporter v1.2 Released.

A new version of SQLite Forensic Reporter, Universal SQLite database examination tool is now available, Version 1.2 includes more features to analyse, extract and report on information from any SQLite database (not corrupted or encrypted). Useful for Computer & Phone

Backbone’s Steganography Application Fingerprint Database v3.11 released

Backbone Security has announced the release of Version 3.11 of the Steganography Application Fingerprint Database (SAFDB) which now contains 1,000 steganography applications…Developed in Backbone’s Steganography Analysis and Research Center (SARC), SAFDB is the world’s largest commercially available hash set exclusive

Skype in eDiscovery

Author: Stuart Clarke, 7Safe The EDRM (Electronic Discovery Reference Model) is a widely accepted workflow, which guides those involved in eDiscovery. Typically, the identification and collection phases see email and common office documents harvested, but as technology moves forward is

Forensic Toolkit v3 Tips and Tricks – On a budget

While researching FTK 3X and Oracle, you just recently discovered that the best configuration of your Oracle database would be on a solid state drive (SSD). Solid state drives give the maximum level of performance to Oracle databases and in

Anonymous, what does it mean?

Anonymous, a word which Merriam-Webster describes as: of unknown authorship or origin, not named or identified, or lacking individuality, distinction, or recognizability. There are some in this world that wish to remain anonymous, not named or identified. Sure I am

NJIT to host digital forensics, watermarking, steganography conference

The 10th International Workshop on Digital-Forensics and Watermarking will be held Oct. 23-26, 2011 at the ACH Casino Resort, Atlantic City. The event, organized by NJIT Professor of Electrical and Computer Engineering Yun-Qing Shi, is a forum for researchers and

Guidance forensics tool now working with SIEM

Guidance Software says its computer forensics tool is now capable of automated collection of data on endpoint devices, including computers and smartphones, based on a security information and event management (SIEM) alert. The Guidance product, EnCase Cybersecurity version 4.3, can