Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท10h
๐Ÿ›๏ธPREMIS Metadata
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Sorting encrypted data without decryption: a practical trick
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Hash Functions
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท12h
๐ŸšจIncident Response
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.comยท1d
๐ŸŒก๏ธPreservation Entropy
The Day I Hacked XCTrack
blog.syrac.orgยท8hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
A disenshittification moment from the land of mass storage
doctorow.medium.comยท11h
๐ŸงฒMagnetic Philosophy
ITDR vs EDR: What are the Key Differences?
heimdalsecurity.comยท1d
๐ŸŽฏThreat Hunting
Welcome to LILโ€™s Data.gov Archive Search
lil.law.harvard.eduยท3h
๐Ÿ’พData Preservation
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท10h
๐Ÿ›กCybersecurity
New Articles: Journal of Contemporary Archival Studies
archivespublishing.comยท1d
โš–๏ธArchive Ethics
The Importance of Email Security
securityscorecard.comยท8h
๐ŸŽฏThreat Hunting
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.comยท5hยท
๐Ÿ› ๏ธGreaseweazle
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
E-Evidence: Government wants to facilitate international access to cloud data
heise.deยท2d
โš–๏ธLegal Compliance
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.comยท1d
๐Ÿ”„Content Deduplication
Forensic Video Workflow with Amped FIVE โ€“ Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.comยท3d
โš–๏ธDigital Evidence
The Why of PGP Authentication
articles.59.caยท10h
๐Ÿ”‘Cryptographic Protocols
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comยท10hยท
Discuss: Hacker News
๐Ÿ“ผCassette Archaeology