Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Heart disease and cancer are overwhelmingly the most common causes of death in the United States. But researchers always like to dig deeper in to health trends than that. A new map, published by the CDC, shows the illnesses and accidents that disproportio

CDC Death Map Shows Each State's Most Common Killer

May 22, 2015 | by Marissa Fessenden, Smithsonian | Comments

Heart disease and cancer are overwhelmingly the most common causes of death in the United States. But researchers always like to dig deeper in to health trends than that. A new map, published by the CDC, shows the illnesses and accidents that disproportionately claim people in each state. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

Moving Beyond 'Medieval' Cybersecurity

May 26, 2015 10:42 am | by Andrew Careaga, Missouri S&T | Comments

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

TOPICS:
China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.”

China's Military Has Declared War on Western Thought on the Internet

May 26, 2015 10:08 am | by Lily Kuo, Quartz | Comments

China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.” 

TOPICS:
The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

NSA Winds Down Once-Secret Phone-Records Collection Program

May 26, 2015 9:40 am | by Ken Dilanian, Associated Press | Comments

The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

TOPICS:
Advertisement

The Germ at the Scene of the Crime

May 26, 2015 9:24 am | by Viviane Richter, Cosmos | Comments

The germs you  pick up at a crime scene may one day land you in jail. Microbiologist Jack Gilbert and his team at the Argonne National Laboratory in Chicago have shown that bacteria clinging to the sole of your shoe could be a microscopic smoking gun that tells crime scene investigators where you’ve been.

TOPICS:

Should Texts, E-mail, Tweets and Facebook Posts Be the New Fingerprints in Court?

May 26, 2015 9:15 am | by Frances Stead Sellers, Washington Post | Comments

In an episode of the CBS show “Criminal Minds” that aired last year, an FBI team is on a frantic hunt for a missing 4-year-old. The team soon realizes that the girl has been given away by a relative, Sue, and that there’s no way Sue is going to reveal her whereabouts.

TOPICS:
As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over time to become even more lethal. So, departments of the U.S. Army came up with a plan to provi

Soldiers Help Identify New IED Threats Using Forensics

May 22, 2015 2:07 pm | by David Vergun, U.S. Army | Comments

As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over time to become even more lethal. So, departments of the U.S. Army came up with a plan to provide training and equipment to frontline Soldiers - particularly explosives ordnance personnel - to do forensics to speed up investigations.

The Hatton Garden heist was a daring raid that involved climbing down lift shafts,   drilling through a reinforced concrete wall, gaining entry to a secure vault and   breaking numerous secure metal safe boxes before making away with valuables, right   un

How to Solve a Jewel Heist (and Why It Takes So Long)

May 22, 2015 11:46 am | by Emma Rixon, Tne Conversation | Comments

The Hatton Garden heist was a daring raid that involved climbing down lift shafts, drilling through a reinforced concrete wall, gaining entry to a secure vault and breaking numerous secure metal safe boxes before making away with valuables, right under the noses of security and police. But the investigation moved from snail’s, to making several charges in 48 hours. So what goes on and why is it all so slow?

TOPICS:
The hunt for a registered sex offender suspected of killing his ex-girlfriend and her son intensified Thursday after police raided but failed to find anyone inside a home in western Missouri, where the man was charged last month for allegedly keeping the

Police: Woman Held in Box for Months Found Dead, Man Sought

May 22, 2015 11:14 am | Comments

The hunt for a registered sex offender suspected of killing his ex-girlfriend and her son intensified Thursday after police raided but failed to find anyone inside a home in western Missouri, where the man was charged last month for allegedly keeping the woman confined in a wooden box.

TOPICS:
Advertisement
Digital forensics isn't only about fancy tools and technologies that aid investigators in their work. It's as much about ingenuity and creativity as technology, and requires a unique array of skill: the technical savvy of a science- club geek married with

Computer Forensic Investigations Require Planning and Investment

May 22, 2015 10:40 am | by Daintry Duffy, CSO | Comments

Digital forensics isn't only about fancy tools and technologies that aid investigators in their work. It's as much about ingenuity and creativity as technology, and requires a unique array of skill: the technical savvy of a science- club geek married with the curiosity that marks a seasoned detective.

TOPICS:
If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android gets stolen, how sure are you that your anti-theft solution will do a good job wiping it and/or locking the devi

Android Factory Reset Not Enough to Keep Data Secure

May 22, 2015 10:14 am | by Zeljka Zorz, Help Net Security | Comments

If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android gets stolen, how sure are you that your anti-theft solution will do a good job wiping it and/or locking the device? Two researchers have published two papers that answer those questions.

TOPICS:
Recently, a Canadian 17-year-old pleaded guilty to 23 charges relating to swatting calls and other false police reports, many of which had targeted his online opponents in the video game League of Legends.

Teen Pleads Guilty to 23 Charges of Swatting, Harassing Online Game Rivals

May 22, 2015 9:50 am | by Sam Machkovech, Ars Technica | Comments

Recently, a Canadian 17-year-old pleaded guilty to 23 charges relating to swatting calls and other false police reports, many of which had targeted his online opponents in the video game League of Legends.

TOPICS:
A U.S. State Department employee is accused of sending threatening emails to college-aged women in the U.S. from his computer at the U.S. Embassy in London, authorities said.

US State Dept. Employee Faces Cyber Stalking, Hacking Charges

May 22, 2015 9:19 am | by Jeff Martin, Associated Press | Comments

A U.S. State Department employee is accused of sending threatening emails to college-aged women in the U.S. from his computer at the U.S. Embassy in London, authorities said.

TOPICS:
As an undetectable means of bumping someone off, poison has fallen steeply out of favour in recent times, forensic technology having advanced to such a degree that the presence of even the smallest quantities of any toxic agent in a corpse will now almost

Poisoning More Difficult With Improving Forensic Technology

May 21, 2015 2:57 pm | by Jon Henley, The Guardian | Comments

As an undetectable means of bumping someone off, poison has fallen steeply out of favour in recent times, forensic technology having advanced to such a degree that the presence of even the smallest quantities of any toxic agent in a corpse will now almost inevitably be detected.

TOPICS:
Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found

HTTPS-Crippling Attack Threatens Tens of Thousands of Web and Mail Servers

May 21, 2015 2:09 pm | by Dan Goodin, Ars Technica | Comments

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.

TOPICS:
A Chinese university denied on Thursday U.S. espionage charges filed against three of its staff who are among six Chinese people the United States has accused of stealing technology often used in military systems.

China University Denies US Economic Espionage Charges

May 21, 2015 1:30 pm | by Michael Martina and Megha Rajagopalan, Reuters | Comments

A Chinese university denied on Thursday U.S. espionage charges filed against three of its staff who are among six Chinese people the United States has accused of stealing technology often used in military systems.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading