Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this cl

Fingerprint Accuracy Stays the Same Over Time

June 30, 2015 | by Michigan State University | Comments

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

Sheriff's Office Says Forensic Lab Damage May Lead to Overturned Convictions

July 1, 2015 12:33 pm | by Kyle Barnett, Louisiana Record | Comments

A contractor is being sued by the Jefferson Parish Sheriff’s Office in Louisiana who claims criminal prosecutions and convictions may be in jeopardy after a wall in its forensics lab allegedly failed due to damage from Hurricane Isaac in 2012.

TOPICS:
China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

New Chinese Law Reinforces Government Control of Cyberspace

July 1, 2015 10:43 am | by Christopher Bodeen, Associated Press | Comments

China's legislature passed sweeping legislation on Wednesday that reinforces government controls over cyberspace, as the nation's leaders try to address what they see as growing threats to Chinese networks and national security.

TOPICS:
The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

Surveillance Court Rules That NSA Can Resume Bulk Data Collection

July 1, 2015 10:14 am | by Charlie Savage, The New York Times | Comments

The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

TOPICS:
Advertisement
The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

Coast Guard Unveils New Cyber Strategy

July 1, 2015 9:46 am | by Richard Sisk, Military.com | Comments

The Coast Guard's leadership has outlined a new cyber strategy while renewing long-standing complaints that a lack of funding has hamstrung proven efforts to interdict drug trafficking.

TOPICS:
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.

OPM Takes Vulnerable Background Investigation Portal Offline

June 30, 2015 12:03 pm | by Zeljka Zorz, Help Net Security | Comments

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms. 

TOPICS:
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their d

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data

June 30, 2015 11:41 am | by Andy Greenberg, Wired | Comments

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.

TOPICS:
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and

Gas Stations in the Bullseye

June 30, 2015 11:12 am | by Kelly Jackson Higgins, Dark Reading | Comments

Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.

TOPICS:
A cyber strategy announced last week by the head of the agency that hackers robbed of sensitive dossiers on federal employees has potential to deter future attacks, say private investigators who probe computer espionage campaigns.

After Historic Hack, OPM Chief’s 15-Point Plan May be Too Little, Too Late

June 30, 2015 10:45 am | by Aliya Sternstein, Nextgov | Comments

A cyber strategy announced last week by the head of the agency that hackers robbed of sensitive dossiers on federal employees has potential to deter future attacks, say private investigators who probe computer espionage campaigns. 

TOPICS:
Advertisement
Looking to bolster how it handles off-the-field incidents, the NFL is adding a new position: Director of Digital Forensic Investigations.

NFL Hiring a New Director of Digital Forensic Investigations

June 30, 2015 9:55 am | by Darren Rovell, ESPN | Comments

Looking to bolster how it handles off-the-field incidents, the NFL is adding a new position: Director of Digital Forensic Investigations.

TOPICS:
Montana autopsies will have to be done in other states in the coming weeks because the state's only two forensic medical examiners qualified to assist county coroners are leaving.

Montana to Outsource Autopsies After Forensic ME's Leave

June 29, 2015 2:51 pm | by The Associated Press | Comments

Montana autopsies will have to be done in other states in the coming weeks because the state's only two forensic medical examiners qualified to assist county coroners are leaving.

TOPICS:
China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy.

Out of the Shadows, China Hackers Turn Cyber Gatekeepers

June 29, 2015 12:27 pm | by Paul Carsten and Gerry Shih, Reuters | Comments

China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy.

TOPICS:
Following two cyber attacks on Penn State University’s College of Liberal Arts, the   university is resetting passwords on its college-issued accounts, but school   officials said they believe no personal identifiable information, such as Social   Securit

Penn State Says It Was Victim of Cyber Attack

June 29, 2015 12:06 pm | by Madasyn Czebiniak, Pittsburgh Post-Gazette | Comments

Following two cyber attacks on Penn State University’s College of Liberal Arts, the university is resetting passwords on its college-issued accounts, but school officials said they believe no personal identifiable information, such as Social Security numbers, or research data has been compromised.

TOPICS:
Recently discovered malware which uses digital steganography to hide itself in .PNG files has been overwhelmingly targeted at US healthcare providers, according to Trend Micro.

Stealthy Stegoloader Trojan in US Healthcare Blitz

June 29, 2015 11:45 am | by Phil Muncaster, Infosecurity Magazine | Comments

Recently discovered malware which uses digital steganography to hide itself in .PNG files has been overwhelmingly targeted at US healthcare providers, according to Trend Micro.

TOPICS:
A newly released document from the FBI sheds a little more light on the government’s controversial policy around the use of zero-day exploits. Though there is still much we don’t know, the question of when the secretive policy was put into place is finall

US Had Zero-Day Policy Since Early 2010

June 29, 2015 11:32 am | by Kim Zetter, Wired | Comments

A newly released document from the FBI sheds a little more light on the government’s controversial policy around the use of zero-day exploits. Though there is still much we don’t know, the question of when the secretive policy was put into place is finally answered: February, 2010.

TOPICS:
People found guilty of crimes in Wisconsin must pay to have their DNA collected — but ambiguous wording in the law may mean they're not all paying the same amount.

State Requires DNA Tests, but Who Pays What?

June 29, 2015 11:05 am | by Sari Leski, Stevens Point Journal | Comments

People found guilty of crimes in Wisconsin must pay to have their DNA collected — but ambiguous wording in the law may mean they're not all paying the same amount.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading