Advertisement
 
The authoritative voice in forensic disciplines
Subscribe to Forensic Magazine

The Lead

Linked to Brutal Attack by a Selfie, Rapist Gets 14 Years

July 6, 2015 | by Seth Augenstein, Digital Reporter | Articles | Comments

When police took the suspect into custody at the scene of the crime about 90 minutes later, they found a selfie that became crucial to their investigation.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Man Arrested in July 4 Slaying on Metro Train

July 7, 2015 12:01 pm | by Peter Hermann, Faiz Siddiqui and Keith L. Alexander, The Washington Post | News | Comments

Authorities suspect that the man charged with fatally stabbing a passenger during a daytime robbery aboard a Metro train Saturday may have been high on synthetic drugs.

TOPICS:
While much attention has been paid to the very public attacks on government agencies, particularly the breach at the Office of Personnel Management, less has been made of the whereabouts of the exfiltrated data. So how easy is it for John Doe to get his h

Government Credentials Show Up on Paste Sites

July 7, 2015 11:40 am | by Brian Robinson | Blogs | Comments

While much attention has been paid to the very public attacks on government agencies, particularly the breach at the Office of Personnel Management, less has been made of the whereabouts of the exfiltrated data. So how easy is it for John Doe to get his hands on the information let loose in these attacks? Extremely, it seems, according to one recent report.

TOPICS:
The recently detected cyber attacks at Pennsylvania State University may spell bad news for other colleges and universities, according to IT security experts. Hackers such as those that targeted Penn State don’t set their sights on individual institutions

Universities are a Playground for Hackers

July 7, 2015 11:29 am | by Carl Straumsheim, Inside Higher Ed | News | Comments

The recently detected cyber attacks at Pennsylvania State University may spell bad news for other colleges and universities, according to IT security experts. Hackers such as those that targeted Penn State don’t set their sights on individual institutions, but on entire industries.

TOPICS:
Advertisement
As part of their routine combat training, Army brigades will be more rigorously challenged to fight enemies in cyberspace.

Army Embeds Cyber Forces in Combat Training Drills

July 7, 2015 10:57 am | by Sandra I. Erwin, National Defense | News | Comments

As part of their routine combat training, Army brigades will be more rigorously challenged to fight enemies in cyberspace.

TOPICS:

Full Conference Program Announced for 2015 R&D 100 Awards & Technology Conference

July 7, 2015 10:35 am | by Advantage Business Media | News | Comments

Advantage Business Media’s R&D Magazine, sponsor of the R&D 100 Awards, today announced the full conference agenda for the R&D 100 Technology Conference to be held November 12-13, 2015 at Caesars Palace in Las Vegas, Nevada.

Privacy and human rights advocates are having a field day picking through a massive leak purporting to show spyware developer Hacking Team's most candid moments, including documents that appear to contradict the company's carefully scripted PR campaign.

Massive Leak Reveals Hacking Team's Most Private Moments in Messy Detail

July 7, 2015 10:31 am | by Dan Goodin, Ars Technica | News | Comments

Privacy and human rights advocates are having a field day picking through a massive leak purporting to show spyware developer Hacking Team's most candid moments, including documents that appear to contradict the company's carefully scripted PR campaign.

TOPICS:

In the Public Eye: FBI’s Fairytale Hair Evidence and the Real-Life Consequences

July 7, 2015 10:03 am | by Forensic Magazine | Videos | Comments

Back in April, the Department of Justice along with the FBI have identified 2,500 cases for review after finding that experts on its microscopic hair comparison unit overstated evidence concerning pattern-based forensic techniques in 95 percent of the 268 cases reviewed so far. Unfortunately, the cases involved 46 states and include 32 defendants that were sentenced to death, of which, 14 have already been executed or died behind bars.

TOPICS:
The cyber attacker who stole 400GB in corporate data belonging to spyware firm Hacking Team has come forward.

Hacking Team Data Theft Culprit Exposed

July 7, 2015 10:01 am | by Charlie Osborne, ZDNet | News | Comments

The cyber attacker who stole 400GB in corporate data belonging to spyware firm Hacking Team has come forward.

TOPICS:
Advertisement
An electromagnetic pulse that would cause catastrophic damage to the nation’s electricity grid, resulting in long-term, national power outages is, indeed, a frightening scenario. But, odds are you have far more to fear from nut-obsessed squirrels than nut

The Threat of the Big Bad Pulse

July 7, 2015 8:20 am | by Emily Schneider and Sharon Burke | Blogs | Comments

An electromagnetic pulse that would cause catastrophic damage to the nation’s electricity grid, resulting in long-term, national power outages is, indeed, a frightening scenario. But, odds are you have far more to fear from nut-obsessed squirrels than nutty extremists when it comes to the reliability of your electricity.

New Method Could Help Estimate Time of Death for a 10-Day-Old Corpse

July 6, 2015 12:51 pm | by Stefano Vanin, The Conversation | News | Comments

In forensic investigations, the time since death is known as the post-mortem interval. Forensic pathologists can use the physical and chemical transformations that occur in the body after the death in order to estimate it

TOPICS:

How Skulls Fracture Could Impact Child Abuse Cases

July 6, 2015 11:05 am | by Matt Mencarini, Lansing State Journal | News | Comments

What they found was that multiple skull fractures and fractures that aren't connected can come from a single impact. The greater the impact force the more fractures there were, and that the direction — or line of the actual fracture — pointed back to the location of impact.

TOPICS:
The FBI's updated Cyber Most Wanted List now includes 15 men (no women). The Bureau is still not offering monetary rewards for information leading to the arrests of five members of the People's Republic of China's People's Liberation Army who remain on th

FBI Offering $4.3M for Help Finding Cyber Most-Wanted

July 6, 2015 10:40 am | by Sara Peters, Dark Reading | News | Comments

The FBI's updated Cyber Most Wanted List now includes 15 men (no women). The Bureau is still not offering monetary rewards for information leading to the arrests of five members of the People's Republic of China's People's Liberation Army who remain on the list. However, they are offering bounties for most others, which add up to over $4.3 million.

TOPICS:
Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.

Hacking Team Hacked, 400GB+ of Company Documents and Emails Leaked

July 6, 2015 10:17 am | by Zeljka Zorz, Help Net Security | News | Comments

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.

TOPICS:
China on Monday downplayed an accusation by U.S. Democratic presidential candidate Hillary Clinton that Beijing had tried to "hack into everything that doesn't move in America."

China Downplays Hillary Clinton Claim It Hacked US Information

July 6, 2015 9:55 am | by Reuters | News | Comments

China on Monday downplayed an accusation by U.S. Democratic presidential candidate Hillary Clinton that Beijing had tried to "hack into everything that doesn't move in America."

TOPICS:
The Animal Farm, an espionage group believed to be part of a French intelligence agency, has added to its zoo of tools with Dino, a backdoor espionage Trojan that uses complex methods to execute commands in a stealthy fashion.

Animal Farm Adds Dino Trojan to Menagerie

July 6, 2015 9:27 am | by Tara Seals, Infosecurity Magazine | News | Comments

The Animal Farm, an espionage group believed to be part of a French intelligence agency, has added to its zoo of tools with Dino, a backdoor espionage Trojan that uses complex methods to execute commands in a stealthy fashion.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading