Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Web Browser Forensics, Part 2

Welcome to part two of the Web Browser Forensics series. In part one, we began investigating the intrusion of the Docustodian document management server hosting a law firm’s data. The server appeared to have been compromised by a group of

Digital highwaymen

Technology hit the headlines for the wrong reasons again last week, as a gang of British software pirates who characterised themselves as latter-day Robin Hoods found themselves in jail. The convictions underlined the perception that cybercrime is on the up,

Federation Warns Company Directors They Are at Risk from Their IT Department

The Federation Against Software Theft today warns UK company directors that they risk being branded ‘software thieves’ because of the actions of their employees, including those in the IT department. This comes in the wake of The Federation’s launch of

Crime time for Chinese net users

Around 20% of the world’s hijacked computers sending out spam, attacking websites and hosting unsavoury material are in China, says a report. The figures, from security firm Ciphertrust, come amid spiralling rates of internet use in China… More (BBC)

Police culture

If you ask Chris Budge, the police are no worse – and may even be a lot better – than any other organisation when it comes to looking at p**n at work. Budge should know. The computer forensic consultant runs

Criminal IT: The crime you can still get away with

In the field of computer crime, there is one glaring problem: the law. Until relatively recently, there was no law to criminalise what might be recognised as obvious ‘mischiefs’ performed against computers; there was no legal framework to make hacking,

Experts in distributed computing see potential for computer forensics

Golden Richard III, a professor of computer science at New Orleans University and a digital forensics expert, has been experimenting with using distributed computing to recover lost computer files. By harnessing the number-crunching power of several computers to work on

Cyberchase: Experts discuss benefits, risks

Like Hansel and Gretel [Brill explained] people leave crumbs as they wander cyberspace or work on their computer desktops. Following those crumbs, forensic scientists at Kroll have been able to trace Saddam Hussein’s stolen billions; understand the implosion of Enron;

Computer aces sleuth for FBI

Sept. 11 turned Sung-Ki Lim and Sang Jun from geeks to G-men. Well, they’re still geeks, but instead of pursuing an MBA or traveling far and wide as systems analysts, the two men are putting their technical skills to work

New Article: Job hunting advice for UK computer forensics professionals

A superb new article by David Sullivan entitled “Job hunting advice for UK computer forensics professionals” is now online at http://www.forensicfocus.com/computer-forensics-jobs-uk I am sure our UK members will find it a very worthwhile read! Jamie

Fraud propels demand for computer forensics training

In the ‘if you can’t beat ’em, join ’em stakes’, computer-based crime is driving more and more IT professionals to study the skills and tools needed to unravel and reveal the inner workings of cyber fraudsters. The general upsurge in

Browser History: What Happened?

Occasionally, you might need to trace a user’s Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser’s cache, and browser history data, isn’t easy. For a good rundown on forensic analysis of browser activity, you should