Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

Marijuana Edibles Blamed for Colorado Death

March 26, 2015 | by Brian Maass, CBS Denver | Comments

The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked

One in Every 3 Top Websites is Compromised and Dangerous

March 27, 2015 11:13 am | by Tara Seals, Infosecurity Magazine | Comments

The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked websites are risky, new research has revealed.

TOPICS:
U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institu

US Rules Make Chances of Cockpit Takeover Slim Says Expert

March 27, 2015 8:52 am | by Rodrique Ngowi, Associated Press | Comments

U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institute of Technology aviation analyst says.

TOPICS:
A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-p

Getting a Critical Edge on Plutonium Identification

March 27, 2015 8:27 am | by NIST | Comments

A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.

TOPICS:
Advertisement
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create

Mathematicians Redesign Encrytion Code to Thwart Cyber Attacks

March 27, 2015 8:27 am | by Rebecca Phillips, Washington State University | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

TOPICS:
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

Inside the Ottawa Police Forensics Lab

March 26, 2015 1:13 pm | by Judy Trinh, CBC News | Comments

They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

TOPICS:
After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them.

Macro-Based Malware Continues to Gain Traction

March 26, 2015 12:30 pm | by Zeljka Zorn, Help Net Security | Comments

After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them. 

TOPICS:
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

BitWhisper Puts the Heat on Air-Gapped Computers

March 26, 2015 10:42 am | by Ben-Gurion University of the Negev | Comments

Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

TOPICS:
Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

Android Apps Vulnerable to Hijacking

March 26, 2015 10:22 am | by Ernie Austin, Associate Editor | Comments

Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

TOPICS:
Advertisement
out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organiz

ISACA Lays Out Forensics for the Data Breach Era

March 25, 2015 12:27 pm | by Tara Seals, Infosecurity Magazine | Comments

When faced with a data breach, the first order of business for companies is to find out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations to consider when dealing with attacks.

TOPICS:
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

US to Stop Collecting Bulk Phone Data if Congress Lets Law Expire

March 25, 2015 12:14 pm | by Mark Hosenball, Reuters | Comments

U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

TOPICS:
Italy's high court took up the appeal of Amanda Knox's murder conviction Wednesday, considering the fate of the "very worried" American and her Italian former boyfriend in the brutal 2007 murder of Knox's British roommate. A decision had been expected as

Italy High Court Deciding Fate of 'Very Worried' Amanda Knox

March 25, 2015 10:59 am | by Colleen Barry and Frances D'Emilio, Associated Press | Comments

Italy's high court took up the appeal of Amanda Knox's murder conviction Wednesday, considering the fate of the "very worried" American and her Italian former boyfriend in the brutal 2007 murder of Knox's British roommate. A decision had been expected as early as Wednesday, but with a full caseload Wednesday and other court matters Thursday, the presiding judge said a ruling may not come down until Friday.

TOPICS:
House intelligence committee leaders unveiled a bipartisan cybersecurity bill Tuesday amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of

House Unveils Cyber Bill and Signals Bipartisan Compromise

March 25, 2015 10:39 am | by Ken Dilanian, Associated Press | Comments

House intelligence committee leaders unveiled a bipartisan cybersecurity bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

TOPICS:
The Army says it's investigating an Islamic State group call to harm U.S. troops at home. The militant organization occupying parts of Iraq and Syria reportedly posted the names, photos and home addresses of 100 American service members accused of partici

Army Investigating Islamic State Threats

March 25, 2015 10:28 am | by Kyle Jahner, Army Times | Comments

The Army says it's investigating an Islamic State group call to harm U.S. troops at home. The militant organization occupying parts of Iraq and Syria reportedly posted the names, photos and home addresses of 100 American service members accused of participating in bombing missions against it.

TOPICS:
The roles of cultural anthropologists as expert witnesses gets a national hearing of its own, as researchers examine how cultural anthropology is applied in the courtroom.

Challenges for Anthropologists When They’re the Expert Witness

March 25, 2015 9:48 am | by Dawn Fuller, University of Cincinnati | Comments

The roles of cultural anthropologists as expert witnesses gets a national hearing of its own, as researchers examine how cultural anthropology is applied in the courtroom. 

TOPICS:
A Florida businessman accused of falsifying his death overseas was located and then arrested by federal authorities after facial recognition software returned a match to his face in passport records. Jose Salvador Lantigua now faces one federal count of p

Biometrics Finds Man Thought Dead

March 25, 2015 9:25 am | by Cyrus Farivar, Ars Technica | Comments

A Florida businessman accused of falsifying his death overseas was located and then arrested by federal authorities after facial recognition software returned a match to his face in passport records. Jose Salvador Lantigua now faces one federal count of providing a false statement on a passport application.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading