UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Traceless Data Extraction From MEGA Cloud

MEGA is an encrypted cloud storage service that allows users to chat with other users, have group video and voice calls, backup photos and videos, and synchronize files. Users may do so between trusted devices or share them privately, on

Use of Automated Systems for Rapid Decisions

Hello everybody. My name is Hannes Spichiger and I’m presenting a short paper called The Use of Automated Systems for Rapid Decisions that I wrote together with my colleague, Timothy Bolle. We both are PhD students at the university of

How to Export Report and Media in MD-VIDEO

We’ve been introducing various features of MD-VIDEO this year and this is the last episode of the how-to video of MD-VIDEO. You can learn how to export reports and media from MD-VIDEO.Check out various types of options to export reports

Jesse Lindmar on Digital Forensics Lab Quality Assurance and Accreditation

Christa: As technology’s advancements continue to outpace practitioner’s ability to keep up, standardizing digital forensics processes, practices and tools has never not been a hot topic in the community. The response ranges from the United Kingdom structured efforts to much

Law Enforcement Educational Challenges for Mobile Forensics

Hello, and welcome to this presentation about law enforcement educational challenges for mobile forensics. My name is Georgina Humphries, and I work for the Norwegian Police University College and the Nordic Computer Forensic Investigators team, and I’m currently working on

Examining Vehicle Data With Magnet AXIOM

Hi, this is Kim Bradley with Magnet Forensics. Today, we’ll be learning how to process vehicle data by using an exported extraction from Berla’s iVe software.  First, to get the extraction you’ll need to export using iVe. You can do

Extract Silent Phone Data in Oxygen Forensic Detective

Silent Phone is described as an end-to-end military-grade encryption app. This app is considered to be more secure than its competitors, providing not only end-to-end encryption but also backdoor policy, self-destructing messages, and marginal access to personal data. Not surprisingly,

Register for Webinar: Delivering the DFIR Advantage to the Frontlines

Explore rapid on-scene digital forensics solutions for the Police, Military and Digital Forensics community Deploying ‘usable’ Digital Forensic technology to the frontlines has never been more important as organisations are challenged to do more with less. As the Digital Forensics

Oxygen Forensic Detective From Oxygen Forensics

I have been using Oxygen Forensic Detective for almost two years now.  During my time using the software, I have had the occasion to provide inculpatory evidence on numerous cases, some of which rely solely on the digital evidence obtained

Identifying Interception Possibilities for WhatsApp Communication

Hello everybody. My name is Dennis Wijnberg, and together with Dr Nhien-An Le-Khac, I’m presenting about Alternative Methods for WhatsApp interception. This research project was part of my dissertation in partial fulfillment of my Master of Science degree for the

How to Automatically Tag Your Assets During an Investigation

Binalyze exclamation point logo with screenshot of list of endpoints
How many Web Servers, Mail Servers, Domain Controllers, and other critical assets do you have on your network or the network you have been asked to investigate? More often than not, nobody can answer this question quickly and this slows

Register For Webinar: AI Helping Good People Make This World Safer

Cyborg hand holding Cloud of justice and law icon bubble
Modern devices allow users to store a tremendous amount of data, including thousands of photos and videos. AI is one of the solutions that might significantly facilitate the investigator’s job and reduce the time they spend on manually analyzing significant