U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institute of Technology aviation analyst says.
University researchers have developed a new way of identifying substances in fingermarks left at...
In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane...
Cockpit voice recordings and, hopefully, flight data will provide the main clues to...
The United States is losing an information war to Russia, Islamic State and other rivals, says a new report that calls for a strengthening in U.S. counter-propaganda efforts and an overhaul of the government's international broadcasting arm.
The military has had its hands full combating ISIS on the battlefield in both Iraq and Syria, attempting to use air power to push the group back from territorial gains. Aside from the difficulties of engaging in another gritty urban combat environment, with the help of 60 nations participating in the U.S.-led coalition, ISIS has also proven themselves adept in the cyber realm – a scary prospect.
The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked websites are risky, new research has revealed.
Autopsies are scheduled on the bodies of two children found in a deep freezer in their Detroit home.
A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.
After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them.
The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.
Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.
They use screen aliases like IS Hunting Club, TouchMyTweets and The Doctor. They troll Twitter for suspected accounts of Islamic State fighters, recruiters and fund-raisers. Then they pounce.
Xiaoyu Alan Zheng and Ted Vorburger of PML’s Semiconductor and Dimensional Metrology Division were appointed to the Organization of Scientific Area Committees’ (OSAC) Subcommittee on Firearms and Toolmarks, part of an initiative by NIST and the Department of Justice to strengthen forensic science in the United States.
When faced with a data breach, the first order of business for companies is to find out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations to consider when dealing with attacks.
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.