From the Heartbleed bug to the Target security breach, malicious hackers have proved to be detrimental to companies’ financial assets and reputations. To combat these malevolent attackers, or “black hats,” a community of benign hackers, “white hats,” has been making significant contributions to cybersecurity by detecting vulnerabilities in companies’ software systems and websites and communicating their findings.
The sole federal judge on a commission appointed by President Obama to improve forensic science in the criminal justice system has resigned in protest, criticizing the U.S. Department of Justice for muzzling its work to benefit prosecutors. U.S. District Judge Jed S. Rakoff said he quit because the Justice Department barred it from recommending expansion of the exchange of pretrial information to include more evidence from forensic experts.
The US military is working on replacing passwords with “cognitive fingerprints.” These rely on stylometrics, which is an analysis of how language is used by individuals. Each person has a different stylometric profile of how they type and word-process, which can be more personally identifying than simple biometrics.
Researchers report that just four fairly vague pieces of information — the dates and locations of four purchases — are enough to identify 90 percent of the people in a data set recording three months of credit-card transactions by 1.1 million users.
With cyber attacks on the rise, information security has become one of the country’s fastest growing fields, with a projected 10-year growth rate of 37 percent, according to the Bureau of Labor Statistics. To help address the critical shortage of cybersecurity specialists, Capella University has launched two new graduate certificates in Digital Forensics and Network Defense.
People accused of carrying out terrorist attacks don’t usually make it to courtroom. They either die in the aftermath of their attacks or they just plead guilty. Or, if it’s an international case, they’re held in an overseas prison and likely never heard from again. That’s why when Dzhokhar Tsarnaev goes on trial for bombing the 2013 Boston Marathon, a lot of people are going to be paying attention.
The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China.
Indonesian investigators announced Thursday the co-pilot of the crashed AirAsia jet was in control when he struggled to recover the aircraft as stall warnings sounded.
The infamous Regin trojan is likely to have been developed by the NSA or one of its allies, after security experts found a number of similarities between it and code discovered amongst leaked Edward Snowden documents.
When operating outside of the law, you can't rely on the police to protect your illegal enterprise from other criminals. The Silk Road marketplace founders likely learned this lesson in 2012 and 2013, after paying thousands of dollars to cyber extortionists.
The Organization of Scientific Area Committees (OSAC), which coordinates the development of standards and guidelines for the forensic science community under the auspices of the National Institute of Standards and Technology (NIST), will hold its first set of public meetings in Orlando, Florida on February 16 and 17, 2015.
Four months after the abduction of 43 rural college students shook the nation and set off a political crisis, Mexico’s attorney general officially declared the students dead, saying confessions and forensic evidence supported the theory that their bodies were incinerated near a garbage dump.
In a new study, researchers have examined how the sense of smell could aid victims in better identifying criminals of violent crime. Previously, using smell in forensics had been completely overlooked.
The Drug Enforcement Administration abandoned an internal proposal to use surveillance cameras for photographing vehicle license plates near gun shows in the United States to investigate gun-trafficking, the agency's chief said Wednesday.
Red Hat Inc and other makers of the widely used Linux operating system for business computers updated their software on Tuesday to thwart a serious new cyber threat they warned could allow hackers to gain remote control of their systems.
A new publication from the National Institute of Standards and Technology (NIST) provides guidance for organizations to improve security as employees move to mobile devices such as phones and tablets for their work and their applications (“mobile apps”).