Dr. Liam Owens, Founder and CEO of Stafford-England-based Semantics 21, explores how artificial intelligence is changing the face of law enforcement. ...more
How To Article
June 26, 2024•4 min read
As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an ... ...more
How To Article
December 21, 2023•2 min read
This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire... ...more
How To Article
December 18, 2023•3 min read
Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of data from any device with a MediaTek chipset. The Boot ROM is always there, and it will not change. Because of ... ...more
How To Article
October 30, 2023•3 min read
When crime scene or accident investigators examine a location, they take all the necessary measures to accurately collect, record and document the environment and characteristics, so as to have the be... ...more
How To Article
April 04, 2023•6 min read
Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can do some or all of the following things. Doing so w... ...more
How To Article
March 23, 2023•5 min read
I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do I need to learn how to code?” – as if it’s a dreaded... ...more
How To Article
March 01, 2023•3 min read
Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed in 2009. In comparison, volatile ... ...more
How To Article
February 07, 2023•3 min read
Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in near... ...more
How To Article ,Hub Article
December 12, 2022•9 min read
As the world continues to adopt the use of cloud storage and make it a part of everyday use in personal and professional settings, you should be aware of the forensic artifacts and logs available for ... ...more
How To Article ,Hub Article
November 10, 2021•5 min read
Many forensic examiners and investigators are used to having resources at their place of employment to work cases. We believe the learning process never stops and no one can be an expert in everything... ...more
How To Article ,Hub Article
November 03, 2021•7 min read
It’s pretty much given that we live in a Windows-centric world. The majority of businesses and individual users out there use Windows machines to get work done. And because of that, it’s safe to say t... ...more
How To Article ,Hub Article
October 14, 2021•5 min read
There is a lot of trust put into your digital forensic tools when it comes to processing data. Many times, the “magic” of the tool remains someone unknown to the end-user. Each company claims to have ... ...more
How To Article ,Hub Article
October 12, 2021•4 min read
Signal is widely considered to be one of the most secure messaging services. Even Edward Snowden called Signal his favorite messenger app. ...more
How To Article ,Hub Article
September 14, 2021•7 min read
Dr. Liam Owens, Founder and CEO of Stafford-England-based Semantics 21, explores how artificial intelligence is changing the face of law enforcement. ...more
How To Article
June 26, 2024•4 min read
As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an ... ...more
How To Article
December 21, 2023•2 min read
This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire... ...more
How To Article
December 18, 2023•3 min read
Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of data from any device with a MediaTek chipset. The Boot ROM is always there, and it will not change. Because of ... ...more
How To Article
October 30, 2023•3 min read
When crime scene or accident investigators examine a location, they take all the necessary measures to accurately collect, record and document the environment and characteristics, so as to have the be... ...more
How To Article
April 04, 2023•6 min read
Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can do some or all of the following things. Doing so w... ...more
How To Article
March 23, 2023•5 min read
I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do I need to learn how to code?” – as if it’s a dreaded... ...more
How To Article
March 01, 2023•3 min read
Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed in 2009. In comparison, volatile ... ...more
How To Article
February 07, 2023•3 min read
Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in near... ...more
How To Article ,Hub Article
December 12, 2022•9 min read
As the world continues to adopt the use of cloud storage and make it a part of everyday use in personal and professional settings, you should be aware of the forensic artifacts and logs available for ... ...more
How To Article ,Hub Article
November 10, 2021•5 min read
Many forensic examiners and investigators are used to having resources at their place of employment to work cases. We believe the learning process never stops and no one can be an expert in everything... ...more
How To Article ,Hub Article
November 03, 2021•7 min read
It’s pretty much given that we live in a Windows-centric world. The majority of businesses and individual users out there use Windows machines to get work done. And because of that, it’s safe to say t... ...more
How To Article ,Hub Article
October 14, 2021•5 min read
There is a lot of trust put into your digital forensic tools when it comes to processing data. Many times, the “magic” of the tool remains someone unknown to the end-user. Each company claims to have ... ...more
How To Article ,Hub Article
October 12, 2021•4 min read
Signal is widely considered to be one of the most secure messaging services. Even Edward Snowden called Signal his favorite messenger app. ...more
How To Article ,Hub Article
September 14, 2021•7 min read