Wednesday, May 6, 2026 Live coverage
Newsletter About Tips Octo DF
LATEST
Wednesday
May 6, 2026
San Diego Edition
Forensic Newsroom
Digital Forensics Today
Independent reporting on digital evidence, cybercrime, and the expert witnesses behind the cases
Est. 2026 · Edition 19 · 2026
Archive

Full Coverage

The complete Digital Forensics Today archive. Every article across every section.
147 Articles in archive
Sections All Mobile Forensics 10 Computer Forensics 6 Legal & Court 8 Case Studies 6 Tool Reviews 6 Expert Witness 7 AI & Forensics 98 Guides 1

More stories Page 2

Digital Forensics

SIM Card Forensics — Evidence on the Chip Nobody Thinks About

Most people think of a SIM card as just a carrier activation chip. Forensically, it's a distinct evidence source with its own...

SIM Card Forensics — Evidence on the Chip Nobody Thinks About
Digital Forensics

Windows Registry Forensics — The System’s Hidden Activity Log

The Windows Registry is one of the richest evidence sources in computer forensics. It records nearly every significant system and user action:...

Windows Registry Forensics — The System’s Hidden Activity Log
Digital Forensics

RAM Forensics — Capturing Volatile Memory Before It’s Gone

RAM (Random Access Memory) is the most volatile evidence source in digital forensics. When the computer powers off, RAM is gone. This...

RAM Forensics — Capturing Volatile Memory Before It’s Gone
Digital Forensics

Metadata Extraction — The Hidden Evidence Inside Every File

Metadata is data about data. Every file created on a digital device carries metadata that records when it was made, when it...

Metadata Extraction — The Hidden Evidence Inside Every File
Digital Forensics

Malware Forensics — Finding and Analyzing Malicious Software in Investigations

Malware forensics sits at the intersection of digital forensics and incident response. When a system is compromised, forensic investigators need to determine...

Malware Forensics — Finding and Analyzing Malicious Software in Investigations
Digital Forensics

Log File Analysis in Digital Forensics — Reading the System’s Activity Record

Log files are the system's diary. Every operating system, web server, network device, and security tool generates logs that record activity —...

Log File Analysis in Digital Forensics — Reading the System’s Activity Record
Digital Forensics

Location Data in Mobile Forensics — GPS, Cell Towers, Wi-Fi, and App History

A modern smartphone is a location-tracking device that also makes calls. Most users don't realize how many distinct location data sources exist...

Location Data in Mobile Forensics — GPS, Cell Towers, Wi-Fi, and App History
Digital Forensics

iPhone Extraction in Digital Forensics — Methods, Tools, and Real Limitations

The iPhone is the most forensically challenging consumer device in widespread use. Apple's layered encryption, Secure Enclave architecture, and consistent OS updates...

iPhone Extraction in Digital Forensics — Methods, Tools, and Real Limitations
Digital Forensics

Hard Drive Imaging in Digital Forensics — The Foundation of Every Investigation

Forensic hard drive imaging is the first and most critical step in any computer forensics investigation. Everything else — file analysis, deleted...

Hard Drive Imaging in Digital Forensics — The Foundation of Every Investigation
Digital Forensics

File Carving — Recovering Deleted Files Without File System Information

When a file is deleted, the file system entry that maps the filename to the data on disk is removed. But the...

File Carving — Recovering Deleted Files Without File System Information
Digital Forensics

Digital Forensics Expert Witness Testimony — Qualifications, Standards, and Court Preparation

Digital Forensics

Encrypted Device Access — Legal Authority, Technical Limits, and Current Methods

Digital Forensics

Employee Monitoring and Digital Forensics — Legal Limits and Investigation Methods

Digital Forensics

Email Forensics — Headers, Deleted Messages, and Authentication

Digital Forensics

Digital Evidence in Divorce Cases — What Forensics Can Uncover

Digital Forensics

Digital Forensics Report Writing — Structure, Objectivity, and Legal Standards

Digital Forensics

Deleted Data Recovery — What Forensic Examiners Can Actually Recover From a Phone

Digital Forensics

Dark Web Investigation — How Forensic Investigators Navigate the Hidden Web