Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with T

Malaysian Forensic Teams Dig Up Trafficking Graves, Police Officers Arrested

May 27, 2015 | by Seth Augenstein, Digital Reporter | Comments

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with Thailand.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Encryption is essential to protecting a variety of human rights, and nation-states should avoid all measures to weaken it, according to a report released by the United Nations Human Rights Council.

UN Report Warns Encryption Backdoors Violate Human Rights

May 29, 2015 9:55 am | by Sara Peters, Dark Reading | Comments

Encryption is essential to protecting a variety of human rights, and nation-states should avoid all measures to weaken it, according to a report released by the United Nations Human Rights Council.

TOPICS:
The Internal Revenue Service believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, Rep. Peter Roskam confirmed to CNN on Thursday.

IRS Believes Massive Data Theft Originated in Russia

May 29, 2015 9:23 am | by Chris Frates. CNN | Comments

The Internal Revenue Service believes that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, Rep. Peter Roskam confirmed to CNN on Thursday.

TOPICS:
The term "forensic linguistics" was coined in 1968 to describe the work of a linguistics professor who analyzed statements that were purportedly dictated by suspects to police in the United Kingdom. The analysis revealed that that the suspects were not ac

How Forensic Linguistics Can Aid Investigations

May 29, 2015 8:16 am | by Liz Martinez, Security Info Watch | Comments

The term "forensic linguistics" was coined in 1968 to describe the work of a linguistics professor who analyzed statements that were purportedly dictated by suspects to police in the United Kingdom. The analysis revealed that that the suspects were not actually giving a narrative account, which was how their statements were supposed to be taken, as required by the judicial rules in place at that time.

TOPICS:
Advertisement
Chinese chemist Haijun Tian was arrested at Los Angeles International Airport in March by Drug Enforcement Administration agents, the prize at the end of an elaborate sting operation aimed at stemming the importation and sale of spice, the street name for

Arrest Opens Window on China's Role in Designer Drug Market

May 29, 2015 8:16 am | by Alan Schwarz, The New York Times | Comments

Chinese chemist Haijun Tian was arrested at Los Angeles International Airport in March by Drug Enforcement Administration agents, the prize at the end of an elaborate sting operation aimed at stemming the importation and sale of spice, the street name for a family of synthetic drugs that look like marijuana and are sprayed with a dangerous hallucinogenic chemical, then smoked.

TOPICS:
SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

Digital Forensics Expert, David Cowen, to Present at SANS Minneapolis 2015

May 28, 2015 12:26 pm | by SANS Institute | Comments

SANS Institute has announced one of the industry's top forensic investigators, David Cowen, will teach SANS' popular FOR408: Windows Forensic Analysis course at SANS Minneapolis 2015 taking place July 20 – 25.

TOPICS:
A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including D

Moose Malware Uses Linux Routers for Social Network Fraud

May 28, 2015 11:56 am | by Sara Peters, Dark Reading | Comments

A new worm targeting Linux routers is exploiting them not through a vulnerability per se, but rather by simply brute-forcing weak passwords. The malware, which researchers have dubbed Linux/Moose, could be used for a wide variety of purposes - including DNS hijacking, DDoSing, and deep network penetration - but so far attackers only seem to be using it for tame social networking fraud.

TOPICS:
Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

Why Insider Threats are Succeeding

May 28, 2015 11:16 am | by TK Keanini, Help Net Security | Comments

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders.

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

Canary Box Aims to Lure Hackers Into Honeypots Before They Make Headlines

May 27, 2015 10:37 am | by Peter Bright, Ars Technica | Comments

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

TOPICS:
Advertisement
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

Total Cost of Average Data Breach Reaches $3.8 Million

May 27, 2015 9:12 am | by Mirko Zorz, Help Net Security | Comments

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

TOPICS:
Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

IRS Says Thieves Stole Tax Info From 100,000

May 27, 2015 8:47 am | by Stephen Ohlemacher, Associated Press | Comments

Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

TOPICS:

The Mystery of the Torso in Buffalo Cave

May 26, 2015 1:13 pm | by Brendan I. Koerner, Wired | Comments

In August 1979, a family hunting arrowheads dug up a headless male torso deep within a rock-strewn cave. The torso, wrapped in burlap and clad in a pink shirt and maroon sweater, was found in a grave 18 inches deep.

TOPICS:
The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

Moving Beyond 'Medieval' Cybersecurity

May 26, 2015 10:42 am | by Andrew Careaga, Missouri S&T | Comments

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

TOPICS:
China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.”

China's Military Has Declared War on Western Thought on the Internet

May 26, 2015 10:08 am | by Lily Kuo, Quartz | Comments

China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.” 

TOPICS:
The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

NSA Winds Down Once-Secret Phone-Records Collection Program

May 26, 2015 9:40 am | by Ken Dilanian, Associated Press | Comments

The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

TOPICS:

The Germ at the Scene of the Crime

May 26, 2015 9:24 am | by Viviane Richter, Cosmos | Comments

The germs you  pick up at a crime scene may one day land you in jail. Microbiologist Jack Gilbert and his team at the Argonne National Laboratory in Chicago have shown that bacteria clinging to the sole of your shoe could be a microscopic smoking gun that tells crime scene investigators where you’ve been.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading