Recent Blogs & Updates

Learn to Examine Email Artifacts

How to Search PDF Attachments in Outlook in Cybercrime Investigations

Mohit | November 24, 2023 | Forensics | 5 Minutes Reading

Email forensic analysts often find themselves in situations where they need to search PDF attachments in Outlook email service. PDFs Read More…

Tactics to Search Images in Outlook for Cybercrime Investigators

Mohit | November 22, 2023 | Forensics | 5 Minutes Reading

In recent times, digital forensics investigators often search images in Outlook and other email clients. Images are one of the Read More…

Find Credit Card Numbers in Files Tips for Cyber Crime Analysts

Mohit | November 21, 2023 | Forensics | 10 Minutes Reading

During cybercrime investigations, detectives often have to find credit card numbers in files present across multiple digital sources. Moreover, as Read More…

What is Phishing Email Forensics? [Solved]

Mohit | August 8, 2023 | Forensics | 4 Minutes Reading

Today with the rise of emerging cyber-attacks, email has become a vital medium for communication, both personally and professionally. However, Read More…

Message-ID Forensics: Make Analysis Easy with Message ID Analyzer

Mohit | July 19, 2023 | Forensics | 7 Minutes Reading

Email headers play a crucial role in the forensics investigation process. Out of other components of the email header, ‘Message Read More…

Outlook PST File Forensics without Microsoft Outlook Email Client

Mohit | June 14, 2023 | Forensics | 6 Minutes Reading

Are you also looking for a solution to open and examine Outlook PST files without MS Outlook email client? Read Read More…

Analyze Thunderbird MBOX Artifacts with Thunderbird Email Viewer

Mohit | May 30, 2023 | Forensics | 6 Minutes Reading

Mozilla Thunderbird is a desktop-based email client which was released in the year 2004 and it has experienced vast growth Read More…

How to Check Properties of Multiple Emails via Single Solution

Mohit | May 30, 2023 | Forensics | 4 Minutes Reading

Emails contain many fields that are meant to be hidden from the user. Most email clients ensure that the redundant Read More…

OLK File Forensics – Examine OLK14 File and Export Evidence

Anurag Sharma | May 30, 2023 | File Format, Forensics | 6 Minutes Reading

Do you want to perform OLK file forensics to carve out evidence? Then, read this blog and explore the best Read More…

Word Cloud Analysis – Text Data Visual Representation

Mohit | May 25, 2023 | Forensics | 5 Minutes Reading

In digital forensics investigation, forensic analysts have to examine a large volume of emails from the data file. While examining, Read More…