Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Alternatives to Helix3

First published August 2009 by BJ Gleason Author’s note: The article you are about to read was originally written in March 2009. The kind people at Linux+DVD magazine have allowed us to make my articles available after the printed version

Graduates: produce an excellent CV

First published July 2009 In this short article, David Sullivan of www.appointments-uk.co.uk, a specialist computer forensics recruiter, looks at how graduates can increase your chances of being selected for interview by improving your CV. David can be contacted at: David@appointments-uk.co.uk

Forensic Investigation of Instant Messenger Histories

First published July 2009 by Belkasoft http://www.belkasoft.com What is an Instant Messenger? According to Wikipedia, “instant messaging (IM) is a form of real-time communication between two or more people based on typed text. The text is conveyed via devices connected

Build Your Own Digital Evidence Collection Kit

First published June 2009 by David Kovar, NetCerto, Inc. Overview Collecting evidence accurately is clearly a foundational element for any ediscovery or forensics analysis project. The equipment required is important, but so are the supporting items – office supplies, forms,

Checking Masts – Cell Site Analysis (CSA)

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Since linking with Jamie Morris at Forensic Focus to create a Mobile Forensics Discussion Forumto bring mobile telephone evidence to a wider audience, I have had several

Recording Telephone Calls

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com A question that often gets asked is “Can I record a telephone call?” and the answer to that is that you can (according to publicly available material),

Mobile Phone and GPS Forensics – Some Thoughts

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Mobile telephones are the predominate wireless telecommunications device throughout the world and most certainly in the UK they predominate other technologies, where ownership has reached well over

Malicious Phone Call Legislation in the UK

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com It is being noted that there is an exponential growth in harassing and intimidating calls from financial companies, card companies and from outsource debt collection firms chasing

SonyEricsson Hidden Evidence

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com I have discovered that it is possible when manually examining some SonyEricssons (such as “K” range etc) that after a user has deleted the Last Number Dialled

TomTom GPS Device Forensics

First published January 2009 Written by Ben LeMere (blemere@gpsforensics.org) & Andy Sayers (asayers@gpsforensics.org) For more information visit GPSForensics.org Introduction: The sales of portable navigation devices are at an all time high. Last year, more than forty million portable GPS devices

Passive Network Security Analysis with NetworkMiner

First published January 2009 by Erik Hjelmvik networkminer.sourceforge.net It is disturbing how often networks are not properly documented in terms of IP plans, network segmentations and network security. Having a good view of the network is essential when performing a

A Discussion of Virtual Machines Related to Forensics Analysis

First published November 2008 by Brett Shavers (PDF version here) The Virtual Machine (VM)Description of the Virtual Machine The Virtual Machine Concept in Brief Virtual machines are not new and have been in use for well over a half century.

Email Evidence – Now You See it, Now You Don’t!

First published October 2008 By Sandy Boucher and Barry Kuang, Intelysis Corp. Background With the ever increasing role of computers and electronic communications in both our business and personal lives, emails have taken on a key evidentiary role in many