A round-up of this week’s digital forensics news and views:
Digital Detectives vs. Android 14: overcoming new forensic challenges
The release of Android 14 requires digital forensics analysts to update their extraction and analysis methods. Analysts must develop new techniques
A round-up of this week’s digital forensics news and views:
iOS 17- The “Forever” Setting That Isn’t… Or Is It?
Digital forensics expert Heather Barnhart reveals a significant change in iOS 17’s message retention tracking mechanism. The update shifts from
A round-up of this week’s digital forensics news and views:
Sleepless in Cupertino: A Forensic Dive into Apple Watch Sleep Tracking
Digital forensic experts have unveiled the potential of Apple Watch’s Sleep app as a crucial tool in criminal investigations.
A round-up of this week’s digital forensics news and views:
UK-based digital forensic investigators and the impact of exposure to traumatic material
A new study reveals that nearly 30% of UK digital forensic investigators report high to severe levels of
A round-up of this week’s digital forensics news and views:
Cellebrite got into Trump shooter’s Samsung device in just 40 minutes
The FBI successfully accessed the locked Samsung smartphone of the deceased Trump shooter using updated digital forensics tools from
A round-up of this week’s digital forensics news and views:
Exploring Host-Based Digital Forensics with Memory Analysis
Forensic experts are turning to memory analysis as a critical tool in uncovering sophisticated cyber attacks. By examining running processes, network connections, and
A round-up of this week’s digital forensics news and views:
Testing a hybrid risk assessment model: Predicting CSAM offender risk from digital forensic artifacts
Researchers conducted a feasibility study for a hybrid risk assessment model that combines traditional tools with
A round-up of this week’s digital forensics news and views:
UK and US cops band together to tackle Qilin’s ransomware shakedowns
In a coordinated response to recent cyberattacks on healthcare systems, UK and US law enforcement agencies have joined forces
A round-up of this week’s digital forensics news and views:
Western Law Enforcement Agencies are Going on the Cyber Offensive
Western law enforcement agencies are increasingly adopting offensive cyber strategies to combat cybercrime, with varying degrees of legal support. The
A round-up of this week’s digital forensics news and views:
UK national accused of hacking dozens of US companies arrested in Spain
Spanish police have arrested a British national accused of leading an organized cybercrime group that broke into dozens
A round-up of this week’s digital forensics news and views:
Navigating the complex world of cell phone forensics: How multiple SIMs and eSIMs impact investigations
There are various challenges that multiple SIM cards and eSIMs in smartphones pose for digital
We Value Your Privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.