Advertisement
 
The authoritative voice in forensic disciplines
Subscribe to Forensic Magazine

The Lead

John Walsh gave a moving keynote speech Monday morning to a packed crowd at the Memorial Auditorium, during the centenial conference of the International Association of Identification (IAI). He highlighted his successes capturing dangerous criminals and b

John Walsh Leads Record Crowd at 100th I.A.I. Conference in Sacramento

August 3, 2015 | by Sean Allocca, Editor | Articles | Comments

John Walsh gave a moving keynote speech Monday morning to a packed crowd at the Memorial Auditorium, during the centennial conference of the International Association of Identification (IAI). He highlighted his successes capturing dangerous criminals and bringing them to justice.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

For more than 20 years, Boone County Sheriff Mike Nielsen has been haunted by the death of an unidentified young woman. But, Nielsen hopes recent advances in DNA technology may finally help detectives solve the case.

Unsolved Murder Leads to Exhumation of Woman Killed in 1992

August 3, 2015 2:55 pm | News | Comments

For more than 20 years, Boone County Sheriff Mike Nielsen has been haunted by the death of an unidentified young woman. But, Nielsen hopes recent advances in DNA technology may finally help detectives solve the case.

TOPICS:

Strange Remains: The Scalping of Jane McCrea

August 3, 2015 2:23 pm | by Dolly Stolze | Articles | Comments

According to a letter written by General Gates to General Burgoyne, the American Indian scouts attacked other villagers in the area then grabbed Sara. But a conflicting version of events recorded that Jane was accidentally shot by American soldiers.

TOPICS:
A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings. The vehicle was on loan to them from a carmaker, and the goal was to find out how hackable it was.

The Cyber Mechanics Who Protect Your Car From Hackers

August 3, 2015 12:18 pm | by Chris Baraniuk, New Scientist | News | Comments

A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings. The vehicle was on loan to them from a carmaker, and the goal was to find out how hackable it was. The team did not need to physically connect to the vehicle or even enter it – they simply jacked in over Wi-Fi. When they did, they soon found an unexpected vulnerability.

TOPICS:
Advertisement
Numerous firms across the financial services sector - and beyond - continue to face a variety of distributed-denial-of-attack and data breach extortion attempts.

FBI to Banks: DDoS Extortions Continue

August 3, 2015 11:56 am | by Mathew J. Schwartz, Gov Info Security | News | Comments

Numerous firms across the financial services sector - and beyond - continue to face a variety of distributed-denial-of-attack and data breach extortion attempts.

TOPICS:
The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true.

Researchers Create First Firmware Worm That Attacks Macs

August 3, 2015 11:20 am | by Kim Zetter, Wired | News | Comments

The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. 

TOPICS:

Quadpod Mount LED Light Tower

August 3, 2015 11:00 am | by Larson Electronics LLC | Product Releases

Larson Electronics has released a 300 watt LED explosion proof quadpod mounted work light. The unit is a quadpod mounted work area light that provides 14,500 square feet of work area coverage with 26,000 lumens of light.

NBC has released a 2014 slide from a secret NSA Threat Operations Center (NTOC)   briefing—a map that shows the locations of "every single successful computer   intrusion" by Chinese state-sponsored hackers over a five-year period. More than 600   US busi

NSA Report Shows China Hacked 600+ US Targets Over 5 Years

August 3, 2015 10:23 am | by Sean Gallagher, Ars Technica | News | Comments

NBC has released a 2014 slide from a secret NSA Threat Operations Center (NTOC) briefing—a map that shows the locations of "every single successful computer intrusion" by Chinese state-sponsored hackers over a five-year period. More than 600 US businesses and institutions were breached during that period.

TOPICS:
The head of the failed Japan-based bitcoin exchange Mt. Gox was arrested in Tokyo on Saturday on suspicion of inflating his cash account by $1 million, authorities said.

Head of Failed Japan-Based Bitcoin Exchange Mt. Gox Arrested

August 3, 2015 10:01 am | by Yuri Kageyama, Associated Press | News | Comments

The head of the failed Japan-based bitcoin exchange Mt. Gox was arrested in Tokyo on Saturday on suspicion of inflating his cash account by $1 million, authorities said.

TOPICS:
Advertisement
The small arthropods clinging to a piece of aircraft debris that washed ashore on an Indian Ocean island may provide valuable evidence in the disappearance of a Malaysia Airlines plane, one of the greatest aviation mysteries in history.

Barnacle Forensics May Unlock Clues in Missing Malaysian Plane

July 31, 2015 2:09 pm | by Alan Levin, Bloomberg | News | Comments

The small arthropods clinging to a piece of aircraft debris that washed ashore on an Indian Ocean island may provide valuable evidence in the disappearance of a Malaysia Airlines plane, one of the greatest aviation mysteries in history.

TOPICS:
It is hard to ignore the overlap of data security and the various forms of digital investigation. And as digital forensic investigators and incident responders join cybersecurity professionals in the investigation of cyber incidents, all involved need to

Digital Professionals Keeping an Eye on the Law

July 31, 2015 1:02 pm | by Ernie Austin, Associate Editor | Articles | Comments

It is hard to ignore the overlap of data security and the various forms of digital investigation. And as digital forensic investigators and incident responders join cybersecurity professionals in the investigation of cyber incidents, all involved need to realize that what they do will have legal ramifications.

TOPICS:
The Verizon Data Breach Report has consistently said, over the years, passwords are a big part of breach compromises. Dr. Lori Cranor, and her team, at CMU has done extensive research on how to choose the best password policies verses usability. What abou

A Threat Intelligence Script for Qualitative Analysis of Passwords Artifacts

July 31, 2015 12:57 pm | by John Franolich | Blogs | Comments

The Verizon Data Breach Report has consistently said, over the years, passwords are a big part of breach compromises. Dr. Lori Cranor, and her team, at CMU has done extensive research on how to choose the best password policies verses usability. What about passwords leaked in the organization you are defending? 

TOPICS:
The FBI is struggling to attract computer scientists to its cybersecurity program mainly due to low pay, a report by the U.S. Department of Justice showed, highlighting weaknesses in a flagship initiative to tackle growing cyber threats.

FBI Understaffed to Tackle Cyber Threats, Says Watchdog

July 31, 2015 12:34 pm | by Lindsay Dunsmuir, Reuters | News | Comments

The FBI is struggling to attract computer scientists to its cybersecurity program mainly due to low pay, a report by the U.S. Department of Justice showed, highlighting weaknesses in a flagship initiative to tackle growing cyber threats.

TOPICS:

'Free Hugs' From Inner City Police Officers Goes Viral

July 31, 2015 10:42 am | by Sean Allocca, Editor | Articles | Comments

This viral video from two inner city police officers is using social media to shape public opinion.

TOPICS:
A recently disclosed vulnerability in Bind, the most widely used software for translating human-friendly domain names into IP addresses used by servers, makes it possible for lone-wolf attackers to bring down huge swaths of the Internet, a security resear

Major Flaw Could Let Lone-Wolf Hacker Bring Down Huge Swaths of Internet

July 31, 2015 10:10 am | by Dan Goodin, Ars Technica | News | Comments

A recently disclosed vulnerability in Bind, the most widely used software for translating human-friendly domain names into IP addresses used by servers, makes it possible for lone-wolf attackers to bring down huge swaths of the Internet, a security researcher has warned.

TOPICS:
Capt. James McColl and Capt. Justin Lanahan are cyber officers, part of the newly created 17-series Army branch. Both participated in a week-long "hackathon" in Arlington, Virginia, July 20-24, in support of continued development of "Plan X," a four-year,

New Army Cyber Officers Hack Improvements Into DARPA's 'Plan X'

July 31, 2015 9:55 am | by C. Todd Lopez, U.S. Army | News | Comments

Capt. James McColl and Capt. Justin Lanahan are cyber officers, part of the newly created 17-series Army branch. Both participated in a week-long "hackathon" in Arlington, Virginia, July 20-24, in support of continued development of "Plan X," a four-year, $120-million program at the Defense Advanced Research Projects Agency, or DARPA.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading