Sunday, March 16 2025
DF15_Home-image

Cryptographic Key Recovery

Andy Swift takes a look at some full disk encryption products and how they store their keys.

Google Desktop Forensics

The first part of a two-part article by Jenn Byrne that looks in detail at examining Google Desktop.

Fuzzing Risks in Software Tools

Bugs can be found in all code, but what are the risks for digital forensic tools?

TigerScheme Not For Profit Certification

Recognised certification for forensic practitioners.

The Great Escape

The first in a series of articles by Ben “Tunnel King” Hubbard & Mark “Cooler King” Osborne.

Everything Time

Forensic timeline creation and review methods.

ECENTRE

Revolutionising law enforcement across Europe.

Registry Recon

Raising the bar in Windows Registry Forensics.

FAW 72

Forensics Acquisition of Websites, Actual Version 1.0.0.3

Nuix Investigator 4.2

We take a look under the hood of Nuix latest release.

Plus all the regular features......

Read Now

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading