Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Bipartisan legislation to end the National Security Agency's bulk phone records collection program has been introduced in Congress.

Bill Would End NSA Bulk Collection Program

April 29, 2015 | by Eric Chabrow, Gov Info Security | Comments

Bipartisan legislation to end the National Security Agency's bulk phone records collection program has been introduced in Congress.

 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already

Digital Thieves Commit Non-Cyber Crimes

May 4, 2015 9:14 am | by Rosa Prince, The Telegraph | Comments

The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already have a background in more traditional offending.

TOPICS:
They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on par

Detectives Search for Clues to Killing in Victim's Tattoo

May 1, 2015 12:35 pm | by Michael Wilson, The New York Times | Comments

They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on part of a leg — leading to the first bona fide clue that, upon further description, is not for the faint of heart.

TOPICS:
An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

Debate Over Setting Blood Standard for Marijuana-Impaired Driving

May 1, 2015 12:13 pm | by Michael Shepherd, centralmaine.com | Comments

An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

TOPICS:
Advertisement
UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal informatio

UC Berkeley Campus Announces Data Breach

May 1, 2015 11:11 am | by Janet Gilmore, UC Berkeley | Comments

UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information.

TOPICS:
On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google i

Google's New Version of Password Alert Blocking Bypass is Bypassed

May 1, 2015 10:49 am | by Dan Goodin, Ars Technica | Comments

On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google issued an update that blocked the exploit. Now the same researcher has figured out a way to block the new version, too.

TOPICS:
The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

Plan for the Next Breach With Incident Response Forensics

May 1, 2015 10:13 am | by (ISC)2 Government Advisory Council Executive Writers Bureau, Lou Magnotti | Comments

The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

TOPICS:
This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

History and Functions of Computer Security Incident Response Teams

May 1, 2015 10:03 am | by Isabel Skierka, Mirko Hohmann, Robert Morgus and Tim Maurer, New America Foundation | Comments

This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

TOPICS:
A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

NSA So Overwhelmed With Data, It's No Longer Effective, Says Whistleblower

May 1, 2015 9:34 am | by Zack Whittaker, ZD Net | Comments

A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

TOPICS:
Advertisement
Forensic document examiners (FDEs) are trained to look not only for substantial similarities or differences among writing samples, but also for repeated small characteristics which may be sufficient to establish the source of the writing. However, several

Eye-Tracking Study Validates Handwriting Analysis

May 1, 2015 8:28 am | by Mara Merlino, NIJ | Comments

Forensic document examiners (FDEs) are trained to look not only for substantial similarities or differences among writing samples, but also for repeated small characteristics which may be sufficient to establish the source of the writing. However, several court cases have challenged the admissibility of forensic document examination and brought some important issues — including potential confirmation bias among FDEs — into focus.

TOPICS:

Germany Foils Suspected Boston-Style Attack, Officials Say

May 1, 2015 8:15 am | by Frank Jordans, Associated Press | Comments

German authorities foiled what they believe may have been an imminent Boston Marathon-style attack on a professional cycling race planned for Friday, seizing a cache of weapons, including a pipe bomb, and chemicals that can be used to make explosives in a raid on a suspected Islamic extremist's home outside Frankfurt.

TOPICS:
Cook County Circuit Judge Thomas J. Lipscomb warned jurors that images of 20-year-old Jessica Mejia's body that were about to be projected on a screen were "graphic" and "not the kind generally seen by the public." Minutes later, Mejia's family sat in the

Evidence Technicians Testify Protocol Was Followed in Photographing Dead Woman's Body

April 30, 2015 2:57 pm | by Tara Kadioglu, Chicago Tribune | Comments

Cook County Circuit Judge Thomas Lipscomb warned jurors that images of 20-year-old Jessica Mejia's body that were about to be projected on a screen were "graphic" and "not the kind generally seen by the public." Minutes later, Mejia's family sat in the corner of the courtroom, wiping tears from their cheeks as they listened to testimony from Maria Lopez, the evidence technician for the Cook County sheriff's department who took the photos.

TOPICS:
Clinics and wards in the Captain James A. Lovell Federal Health Care Center are typically filled with patients, nurses and various staff members moving purposefully from room to room providing patient care. There was a different scene, however, April 17,

Navy Health Care Center Supports SAFE Kit Scene

April 30, 2015 2:31 pm | by Petty Officer 2nd Class Darren Moore, DVIDS | Comments

Clinics and wards in the Captain James A. Lovell Federal Health Care Center are typically filled with patients, nurses and various staff members moving purposefully from room to room providing patient care. There was a different scene, however, April 17, 2015, on the third floor of Building 134, as patients and staff were replaced with actors and a video crew.

TOPICS:
One man ran naked through a Florida neighborhood, tried to have sex with a tree and told police he was the mythical god Thor. Another ran nude down a busy city street in broad daylight, convinced a pack of German shepherds was pursuing him. The common ele

Flakka, Synthetic Drug Behind Increasingly Bizarre Crimes

April 30, 2015 2:18 pm | by Curt Anderson, Associated Press | Comments

One man ran naked through a Florida neighborhood, tried to have sex with a tree and told police he was the mythical god Thor. Another ran nude down a busy city street in broad daylight, convinced a pack of German shepherds was pursuing him. The common element to these and other bizarre incidents in Florida in the last few months is flakka, an increasingly popular synthetic designer drug.

TOPICS:
Google has created a Chrome extension that warns users when they accidentally enter their Google password into a phishing page aimed at hijacking their account. The extension will also urge them to change their passwords.

Chrome Extension Gets Google Passwords Off the Hook

April 30, 2015 12:51 pm | by Ernie Austin, Newsletter Editor | Comments

Google has created a Chrome extension that warns users when they accidentally enter their Google password into a phishing page aimed at hijacking their account. The extension will also urge them to change their passwords.

TOPICS:
The top cyber official for the Air Force says the service’s space and satellite networks are being constantly hacked by outside groups.

Cyber General: US Satellite Networks Hit by 'Millions' of Hacks

April 30, 2015 12:19 pm | by Martin Matishak, The Hill | Comments

The top cyber official for the Air Force says the service’s space and satellite networks are being constantly hacked by outside groups.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading