Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with T

Malaysian Forensic Teams Dig Up Trafficking Graves, Police Officers Arrested

May 27, 2015 | by Seth Augenstein, Digital Reporter | Comments

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with Thailand.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

In 2013, a pair of private investigators in the Bay Area embarked on a fairly run-of-the-mill case surrounding poached employees. But according to a federal indictment unsealed in February, their tactics sounded less like a California noir and something m

Hackers On Demand

May 29, 2015 11:24 am | by Steven Melendez, Fast Company | Comments

In 2013, a pair of private investigators in the Bay Area embarked on a fairly run-of-the-mill case surrounding poached employees. But according to a federal indictment unsealed in February, their tactics sounded less like a California noir and something more like sci-fi: To spy on the clients' adversaries, prosecutors say, they hired a pair of hackers.

TOPICS:
The dark web has become notorious for the sale of drugs, stolen financial data, and even guns, but in their latest crackdown, the feds are dragging another unlikely cash cow of the contraband underground into the spotlight: counterfeit coupons. For one fr

Inside a Giant Dark-Web Scheme to Sell Counterfeit Coupons

May 29, 2015 10:28 am | by Andy Greenberg, Wired | Comments

The dark web has become notorious for the sale of drugs, stolen financial data, and even guns, but in their latest crackdown, the feds are dragging another unlikely cash cow of the contraband underground into the spotlight: counterfeit coupons. For one fraudster, those fakes were good for tens of millions of dollars worth of every consumer product from kitty litter to Clif bars to condoms.  

TOPICS:
A fresh cyberspying campaign has been able to steal about 10,000 files from small-to-medium sized businesses — so far.

Grabit Spy Campaign Nabs 10,000 SMB Files

May 29, 2015 10:06 am | by Tara Seals, Infosecurity Magazine | Comments

A fresh cyberspying campaign has been able to steal about 10,000 files from small-to-medium sized businesses — so far.

TOPICS:
Advertisement
Encryption is essential to protecting a variety of human rights, and nation-states should avoid all measures to weaken it, according to a report released by the United Nations Human Rights Council.

UN Report Warns Encryption Backdoors Violate Human Rights

May 29, 2015 9:55 am | by Sara Peters, Dark Reading | Comments

Encryption is essential to protecting a variety of human rights, and nation-states should avoid all measures to weaken it, according to a report released by the United Nations Human Rights Council.

TOPICS:
The Internal Revenue Service believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, Rep. Peter Roskam confirmed to CNN on Thursday.

IRS Believes Massive Data Theft Originated in Russia

May 29, 2015 9:23 am | by Chris Frates. CNN | Comments

The Internal Revenue Service believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, Rep. Peter Roskam confirmed to CNN on Thursday.

TOPICS:
The term "forensic linguistics" was coined in 1968 to describe the work of a linguistics professor who analyzed statements that were purportedly dictated by suspects to police in the United Kingdom. The analysis revealed that that the suspects were not ac

How Forensic Linguistics Can Aid Investigations

May 29, 2015 8:16 am | by Liz Martinez, Security Info Watch | Comments

The term "forensic linguistics" was coined in 1968 to describe the work of a linguistics professor who analyzed statements that were purportedly dictated by suspects to police in the United Kingdom. The analysis revealed that that the suspects were not actually giving a narrative account, which was how their statements were supposed to be taken, as required by the judicial rules in place at that time.

TOPICS:
Chinese chemist Haijun Tian was arrested at Los Angeles International Airport in March by Drug Enforcement Administration agents, the prize at the end of an elaborate sting operation aimed at stemming the importation and sale of spice, the street name for

Arrest Opens Window on China's Role in Designer Drug Market

May 29, 2015 8:16 am | by Alan Schwarz, The New York Times | Comments

Chinese chemist Haijun Tian was arrested at Los Angeles International Airport in March by Drug Enforcement Administration agents, the prize at the end of an elaborate sting operation aimed at stemming the importation and sale of spice, the street name for a family of synthetic drugs that look like marijuana and are sprayed with a dangerous hallucinogenic chemical, then smoked.

TOPICS:
SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

Digital Forensics Expert, David Cowen, to Present at SANS Minneapolis 2015

May 28, 2015 12:26 pm | by SANS Institute | Comments

SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

TOPICS:
Advertisement
A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including D

Moose Malware Uses Linux Routers for Social Network Fraud

May 28, 2015 11:56 am | by Sara Peters, Dark Reading | Comments

A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including DNS hijacking, DDoSing, and deep network penetration - but so far attackers only seem to be using it for tame social networking fraud.

TOPICS:
Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

Why Insider Threats are Succeeding

May 28, 2015 11:16 am | by TK Keanini, Help Net Security | Comments

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

Canary Box Aims to Lure Hackers Into Honeypots Before They Make Headlines

May 27, 2015 10:37 am | by Peter Bright, Ars Technica | Comments

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

TOPICS:
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

Total Cost of Average Data Breach Reaches $3.8 Million

May 27, 2015 9:12 am | by Mirko Zorz, Help Net Security | Comments

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

TOPICS:
Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

IRS Says Thieves Stole Tax Info From 100,000

May 27, 2015 8:47 am | by Stephen Ohlemacher, Associated Press | Comments

Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

TOPICS:

The Mystery of the Torso in Buffalo Cave

May 26, 2015 1:13 pm | by Brendan I. Koerner, Wired | Comments

In August 1979, a family hunting arrowheads dug up a headless male torso deep within a rock-strewn cave. The torso, wrapped in burlap and clad in a pink shirt and maroon sweater, was found in a grave 18 inches deep.

TOPICS:
The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

Moving Beyond 'Medieval' Cybersecurity

May 26, 2015 10:42 am | by Andrew Careaga, Missouri S&T | Comments

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading