Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

On Friday, GitHub, the open-source software code collaboration site, said they were experiencing the largest DDoS (distributed denial of service) attack in github.com's history, according to their blogpost.

DDoS Attack Targets GitHub Anti-Censorship

March 30, 2015 | by Ernie Austin, Associate Editor | Comments

On Friday, GitHub, the open-source software code collaboration site, said they were experiencing the largest DDoS (distributed denial of service) attack in github.com's history, according to their blogpost.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Saudi hackers from Team Bad Dream have hacked and defaced the official website of  U.S. Army Picatinny Arsenal.

US Army Picatinny Arsenal Website Defaced by Saudi Hackers

March 30, 2015 1:34 pm | by Hack Read | Comments

Saudi hackers from Team Bad Dream have hacked and defaced the official website of  U.S. Army Picatinny Arsenal. 

TOPICS:
Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival Ch

Taiwan Wants Stronger Cyber Ties with US to Counter China Threat

March 30, 2015 1:17 pm | by Michael Gold and J.R. Wu, Reuters | Comments

Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival China.  

TOPICS:

DNA Evidence Used to Prevent Costly Medical Errors

March 30, 2015 11:31 am | by Shari Rudavsky, Indianapolis Star | Comments

Indianapolis-based Strand Analytical Laboratories, which was started a decade ago to run DNA tests on crime scene evidence, now spends most of its time helping solve false positives on cancer biopsies.

TOPICS:
Advertisement
In the young, billion-dollar growth sector of threat intel, vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. That's because right now, organizations know they need to 'do' threat intelligence - yet

New Threat Intelligence Report Skewers Industry Confusion, Charlatans

March 30, 2015 11:27 am | by Violet Blue, ZD Net | Comments

In the young, billion-dollar growth sector of threat intel, vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. That's because right now, organizations know they need to 'do' threat intelligence - yet few understand, or can agree on what that means.

TOPICS:

Germanwings Crash: Forensic Teams Identify 78 DNA Strands From Remains

March 30, 2015 11:10 am | by Luke Harding and Angelique Chrisafis, The Guardian | Comments

Rescuers are still, however, to locate the plane’s second black box — its flight data recorder — six days after the Barcelona to Düsseldorf flight crashed into a rocky ravine at 435 miles (700km) per hour.

TOPICS:
University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

Researchers Leaving Their Own Marks on Crime Solving

March 27, 2015 2:13 pm | by The Independent | Comments

University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

TOPICS:
In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

Police Sort Crash Victims' Remains

March 27, 2015 1:36 pm | by Mark Deen, Bloomberg | Comments

In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

TOPICS:
The United States is losing an information war to Russia, Islamic State and other rivals, says a new report that calls for a strengthening in U.S. counter-propaganda efforts and an overhaul of the government's international broadcasting arm.

US Losing 'Information War' to Russia, Others

March 27, 2015 12:00 pm | by Warren Strobel, Reuters | Comments

The United States is losing an information war to Russia, Islamic State and other rivals, says a new report that calls for a strengthening in U.S. counter-propaganda efforts and an overhaul of the government's international broadcasting arm.

TOPICS:
Advertisement
The military has had its hands full combating ISIS on the battlefield in both Iraq and Syria, attempting to use air power to push the group back from territorial gains. Aside from the difficulties of engaging in another gritty urban combat environment, wi

ISIS Proves Savvy in Social Media, Cyber Domain

March 27, 2015 11:52 am | by Mark Pomerleau, Defense Systems | Comments

The military has had its hands full combating ISIS on the battlefield in both Iraq and Syria, attempting to use air power to push the group back from territorial gains. Aside from the difficulties of engaging in another gritty urban combat environment, with the help of 60 nations participating in the U.S.-led coalition, ISIS has also proven themselves adept in the cyber realm – a scary prospect.

TOPICS:
The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked

One in Every 3 Top Websites is Compromised and Dangerous

March 27, 2015 11:13 am | by Tara Seals, Infosecurity Magazine | Comments

The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked websites are risky, new research has revealed.

TOPICS:
Autopsies are scheduled on the bodies of two children found in a deep freezer in their Detroit home.

Autopsies Scheduled for Detroit Children Found in Freezer

March 27, 2015 10:45 am | Comments

Autopsies are scheduled on the bodies of two children found in a deep freezer in their Detroit home.

TOPICS:
U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institu

US Rules Make Chances of Cockpit Takeover Slim Says Expert

March 27, 2015 8:52 am | by Rodrique Ngowi, Associated Press | Comments

U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institute of Technology aviation analyst says.

TOPICS:
A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-p

Getting a Critical Edge on Plutonium Identification

March 27, 2015 8:27 am | by NIST | Comments

A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.

TOPICS:
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create

Mathematicians Redesign Encrytion Code to Thwart Cyber Attacks

March 27, 2015 8:27 am | by Rebecca Phillips, Washington State University | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

TOPICS:
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

Inside the Ottawa Police Forensics Lab

March 26, 2015 1:13 pm | by Judy Trinh, CBC News | Comments

They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading