Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Federal law enforcement officials will be routinely required to get a search warrant before using secretive and intrusive cellphone-tracking technology under a new Justice Department policy announced Thursday.

New Federal Requirements on Cellphone Surveillance

September 4, 2015 | by Eric Tucker, Associated Press | Comments

Federal law enforcement officials will be routinely required to get a search warrant before using secretive and intrusive cellphone-tracking technology under a new Justice Department policy announced Thursday.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Investigators continue working to identify the remains found inside a burning truck but it could be some time before they have an answer. Caddo Parish, Louisiana Coroner Todd Thoma is tasked with identifying the remains.

Coroner's Challenge to ID Burn Victim's Remains

September 4, 2015 12:09 pm | by Zach Beaird, The Shreveport Times | Comments

Investigators continue working to identify the remains found inside a burning truck but it could be some time before they have an answer. Caddo Parish, Louisiana Coroner Todd Thoma is tasked with identifying the remains.

TOPICS:
Hackers latest tactic involves a malware-free attack using a company's own system credentials and admin tools to gain access.

Stealing Data by 'Living Off the Land'

September 4, 2015 8:55 am | by Rutrell Yasin, Dark Reading | Comments

Hackers latest tactic involves a malware-free attack using a company's own system credentials and admin tools to gain access.

TOPICS:
When Senators return to Washington, DC this fall, they will take up work on legislation to make it easier for companies to share cybersecurity information with each other and with the government. Unfortunately, if they succeed, proposed bills in their cur

What Congress Can Learn From the Military About Cybersecurity

September 4, 2015 8:15 am | by Rob Knake, Defense One | Comments

When Senators return to Washington, DC this fall, they will take up work on legislation to make it easier for companies to share cybersecurity information with each other and with the government. Unfortunately, if they succeed, proposed bills in their current form or any of their amendments will do much to increase the effectiveness or timeliness of cybersecurity information sharing.

TOPICS:
Advertisement
Cloud data offers a digital footprint that can prove vital in forensic investigations. Sources can generate critical leads which can help investigators piece together criminal cases and provide important evidence. This evidence can then be put forward by

How Private Cloud Data is Being Used to Catch Criminals

September 4, 2015 8:13 am | by Chloe Green, Information Age | Comments

Cloud data offers a digital footprint that can prove vital in forensic investigations. Sources can generate critical leads which can help investigators piece together criminal cases and provide important evidence. This evidence can then be put forward by prosecutors in a court of law or provide defense lawyers with a much needed alibi for their client.

TOPICS:
Receiving $750,000 apiece for wrongful imprisonment is a bittersweet reward for two North Carolina brothers who suffered an emotional and physical toll from their three decades of incarceration.

Bittersweet Reward for Brothers Wrongly Imprisoned 30 Years

September 3, 2015 2:33 pm | by Jonathan Drew, Associated Press | Comments

Receiving $750,000 apiece for wrongful imprisonment is a bittersweet reward for two North Carolina brothers who suffered an emotional and physical toll from their three decades of incarceration.

TOPICS:
After several years of internal debate, the Pentagon decided this spring to disinter 61 caskets holding the remains of up to 388 unidentified USS Oklahoma service members. The identifications — which investigators think will take five years — are also lik

Offutt Lab Helping ID Remains of Men Killed at Pearl Harbor

September 3, 2015 12:32 pm | by Steve Liewer, Omaha World-Herald | Comments

After several years of internal debate, the Pentagon decided this spring to disinter 61 caskets holding the remains of up to 388 unidentified USS Oklahoma service members. The identifications — which investigators think will take five years — are also likely to spur identifications of many other “unknown” remains resting in military cemeteries around the world. 

TOPICS:
Thai police said Wednesday a prime suspect in Bangkok's deadly bombing has admitted to being near the shrine where the attack took place but denied placing the bomb, as other clues increasingly linked the blast to Thailand's forced repatriation of members

Thai Bomb Suspect Near Scene, Prints Match Bomb Material

September 3, 2015 11:57 am | by Nattasuda Anusonadisai and Jocelyn Decker, Associated Press | Comments

Thai police said Wednesday a prime suspect in Bangkok's deadly bombing has admitted to being near the shrine where the attack took place but denied placing the bomb, as other clues increasingly linked the blast to Thailand's forced repatriation of members of a minority ethnic group to China.

TOPICS:
Tanya Smith could not believe her eyes as she watched her computer being operated by a hacker somewhere in cyberspace. Bright green text scrolled against the black computer screen as the hacker typed away furiously in front of her. She was helpless to sto

Hacker Stuns Ohio Family With Computer Takeover

September 3, 2015 10:03 am | by Julie E. Martin, Trib Live | Comments

Tanya Smith could not believe her eyes as she watched her computer being operated by a hacker somewhere in cyberspace. Bright green text scrolled against the black computer screen as the hacker typed away furiously in front of her. She was helpless to stop it — her keyboard and mouse rendered useless by the intruder.

TOPICS:
Advertisement
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. Of little surprise has been the continued lack of importance a large number of companies, and

How Cyber Crime Has Changed Over the Past 5 Years (It Hasn’t Got Any Better)

September 3, 2015 9:20 am | by David Glance, The Conversation | Comments

Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. Of little surprise has been the continued lack of importance a large number of companies, and individuals, have placed on implementing basic security practices like applying updates to software and implementing policies around passwords.

TOPICS:
Over 190.3 million people in the US own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Mobile malware is spiking, and is all too often pre-installed on a user’s device.

26 Mobile Phone Models Contain Pre-Installed Spyware

September 3, 2015 8:44 am | by Tara Seals, Infosecurity Magazine | Comments

Over 190.3 million people in the US own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Mobile malware is spiking, and is all too often pre-installed on a user’s device.

TOPICS:
Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

Barclays Hacks Its Own Systems Before Criminals Do

September 2, 2015 1:12 pm | by Keila Guimaraes and Stephen Morris, Bloomberg | Comments

Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

TOPICS:
Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

Sneaky Adware Caught Accessing Users' Mac Keychain Without Permission

September 2, 2015 12:52 pm | by Dan Goodin, Ars Technica | Comments

Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

TOPICS:
He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy

Vasectomy is New Clue in EMU Student's Bathtub Drowning

September 2, 2015 12:31 pm | by Katrease Stafford, Detroit Free Press | Comments

He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy are among the evidence that led Ypsilanti police to name the stepfather of a murdered Eastern Michigan University student as a person of interest in their investigation.

TOPICS:
The first study to test the skills of FBI agents and other law enforcers who have been trained in facial recognition has provided a reassuring result – they perform better than the average person or even computers on this difficult task.

Forensic Examiners Pass the Face-Matching Test

September 2, 2015 11:39 am | by Deborah Smith, University of New South Wales | Comments

The first study to test the skills of FBI agents and other law enforcers who have been trained in facial recognition has provided a reassuring result – they perform better than the average person or even computers on this difficult task.

TOPICS:
Former professional wrestling star Jimmy "Superfly" Snuka was charged Tuesday with third-degree murder and involuntary manslaughter in the death of his mistress more than three decades ago.

Pro-Wrestler 'Superfly' Snuka Charged in Girlfriend's 1983 Death

September 2, 2015 11:26 am | by The Associated Press | Comments

Former professional wrestling star Jimmy "Superfly" Snuka was charged Tuesday with third-degree murder and involuntary manslaughter in the death of his mistress more than three decades ago.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading