Blog2018-08-27T16:56:57-06:00

Digital Forensics & Cyber Security Blog

Digital Forensics & Cyber Security Blog

Computer artifacts: Exploring metadata, log files, registry data, and more

Computer artifacts are important. Society is becoming increasingly dependent on digital devices and networks, and every file opened, downloaded, or shared creates a digital footprint on their computer systems, regardless of the operating system. These footprints encompass a wide variety of digital artifacts including files, logs, and metadata and examining [...]

Passware Kit 2024 v3 Now Available

What's new in Passware Kit 2024 v3 Passware Kit 2024 v3 introduces a new , streamlining the workflow for forensic professionals handling encrypted USB drives. This update enables password recovery for PrivateAccess, SecureAccess, and ENC vaults. The process is GPU-accelerated, reaching speeds of up to 8,000 passwords per second on [...]

VNR 8.2 – AI XOR Generation: Speed and Quality Breakthrough

Rusolut is a leading provider of advanced data recovery solutions and forensic tools, specializing in technologies for recovering data from damaged or inaccessible storage devices. Their VNR (Visual NAND Reconstructor) eMMC and NAND tools are designed to extract and reconstruct data from NAND flash memory chips, offering robust support for [...]

Evolution of AI Tools in the Digital Forensics Landscape

AI has become an integral part of our digital world. From being considered a field of study at the 1956 Dartmouth Conference to the development of expert systems, rule-based logic programs, neural networks, and even beating world chess champion Garry Kasparov, AI has come a long way. Today, AI is [...]

How to quickly find cryptocurrency Wallet Details

Crypto Triage reads multiple blockchains to aid in crypto investigations. Crypto Report... use your preferred mobile forensic tool to extract the evidence locked device or smartphone. Load your extracted evidence into BlockChain Security Crypto tools... and their patented AI and Visual Graphic Modeling technology does the rest. Do you and [...]

The Power of X-Ways Forensics

When it comes to digital forensics, one name stands out for its precision, efficiency, and depth of features: X-Ways Forensics. This tool, favored by professionals worldwide, is renowned for its ability to handle complex digital forensic tasks with ease. Key Features of X-Ways Forensics Integrated Forensic Environment: X-Ways Forensics offers [...]

Built-in Malware Detection for Files and Emails (Oxygen Forensic® Detective v.16.3)

Oxygen Forensic® Detective v.16.3 introduces a built-in malware detection module, enhancing security without additional costs. This feature empowers investigators to detect and analyze malware within files and email databases extracted from mobile devices, computers, and cloud services. Configuring Scans Users can customize settings to: Perform scans during data import Analyze [...]

Unlocking the Power of Digital Forensics with Magnet Griffeye and T3K.AI CORE

Magnet Griffeye, part of Magnet Forensics, is a powerful tool designed to help investigators find, match, and flag illicit content. Think facial recognition, motion-based searches, and object detection—all crafted to streamline the digital forensics investigative process. Griffeye also enables multiple investigators to collaborate on case work and connections. Utilizing AI [...]

Go to Top