Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely

US Court Says Drug-Sniffing Dog Fails the Smell Test

July 30, 2015 | by Michael Tarm, Associated Press | Comments

Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely on their K-9 partners to justify searches when a dog's own competence, as in Lex's case, is itself suspect.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

Can't Touch Russian 'Hammertoss'

July 30, 2015 10:14 am | by Kelly Jackson Higgins, Dark Reading | Comments

A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

TOPICS:
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize thei

Why Russian Cybercrime Markets are Thriving

July 30, 2015 9:43 am | by Mathew J. Schwartz, Gov Info Security | Comments

The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize their efforts.

TOPICS:
The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

Wassenaar Arrangement Goes Back to the Drawing Board

July 30, 2015 9:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

TOPICS:
Advertisement
United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.

United Airlines Hacked by Same Group That Breached Anthem and OPM

July 30, 2015 9:08 am | by Zeljka Zorz, Help Net Security | Comments

United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.  

TOPICS:
About two weeks into last year's conflict in Gaza, Palestinian photographer Jehad Saftawi began to tire of venturing into the city every day to take images of the wreckage. He decided instead to set up a video camera showing the Gaza skyline in his apartm

Gaza Destruction Comes Under Forensic Lens in Amnesty Report

July 29, 2015 11:16 am | by Tristan Martin, Reuters | Comments

About two weeks into last year's conflict in Gaza, Palestinian photographer Jehad Saftawi began to tire of venturing into the city every day to take images of the wreckage. He decided instead to set up a video camera showing the Gaza skyline in his apartment. A year on, Amnesty International says evidence collected by Saftawi and others shows that Israeli forces carried out war crimes in retaliation for the capture of an Israeli soldier.

TOPICS:
The military on Monday exhumed more caskets containing the unidentified remains of USS Oklahoma crew members killed in the 1941 bombing of Pearl Harbor. A lab in Hawaii will identify some remains using dental records. The remains will then be sent to anot

Remains of Pearl Harbor Victims Raised for Identification

July 29, 2015 10:32 am | by Audrey McAvoy, Associated Press | Comments

The military on Monday exhumed more caskets containing the unidentified remains of USS Oklahoma crew members killed in the 1941 bombing of Pearl Harbor. A lab in Hawaii will identify some remains using dental records. The remains will then be sent to another lab in Omaha for DNA analysis.

In its three years in operation, the Iowa Division of Criminal Investigation’s Cold Case Unit brought to close two unsolved homicide cases dating as far back as the 1970s. The unit was shut down in 2011 after the federal grant that funded it ran out. But

Cold Case Unit's End Didn't Stop Search for DNA Profiles

July 29, 2015 8:28 am | by Jeff Reinitz, Globe Gazette | Comments

In its three years in operation, the Iowa Division of Criminal Investigation’s Cold Case Unit brought to close two unsolved homicide cases dating as far back as the 1970s. The unit was shut down in 2011 after the federal grant that funded it ran out. But DCI officials said they continue to investigate homicides cases that have gone years, or even decades, without justice.

TOPICS:
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

Darkode Cyber Crime Forum Might be Making a Comeback

July 29, 2015 8:24 am | by Lucian Constantin, IT World | Comments

The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

TOPICS:
Advertisement
One of the most dangerous vulnerabilities to hit the Android scene ever has been uncovered: Dubbed Stagefright, the flaw makes all Android devices targets of remote take-over by simply receiving an MMS message, without even having to open or view it.

'Heartbleed for Mobile' Hits Android

July 29, 2015 8:24 am | by Tara Seals, Infosecurity Magazine | Comments

One of the most dangerous vulnerabilities to hit the Android scene ever has been uncovered: Dubbed Stagefright, the flaw makes all Android devices targets of remote take-over by simply receiving an MMS message, without even having to open or view it.

TOPICS:
An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was busi

Group That Hacked Anthem Shared Weaponized 0-Days With Rival Attackers

July 29, 2015 8:23 am | by Dan Goodin, Ars Technica | Comments

An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was business as usual for the hacking group, which over the past three years has carried out more than a dozen similar attacks.

TOPICS:
Maybe we should take the warnings of RoboCop more seriously. Famous scientists, engineers, and businessmen are banding together to call for a ban on autonomous weapons development.

The Scientists and Technologists Who Want to Keep AI Out of Weapons

July 29, 2015 8:22 am | by Mike Murphy, Defense One | Comments

Maybe we should take the warnings of RoboCop more seriously. Famous scientists, engineers and businessmen are banding together to call for a ban on autonomous weapons development.

TOPICS:
Social media giants including Twitter, Yahoo, Facebook and Google are pushing back against Senate legislation that would require them to alert federal authorities of any terrorist activity, according to industry and government officials.

Social Media Companies Fear Liability With Terrorism Bill

July 28, 2015 11:52 am | by Anne Flaherty, Associated Press | Comments

Social media giants including Twitter, Yahoo, Facebook and Google are pushing back against Senate legislation that would require them to alert federal authorities of any terrorist activity, according to industry and government officials.

TOPICS:
Planned Parenthood called on the FBI and the U.S. Department of Justice on Monday for help managing cybersecurity, following a report that the reproductive healthcare group's website had been hacked by anti-abortion activists.

Planned Parenthood Investigating Claims of Website Hack

July 28, 2015 10:51 am | by Megan Cassela, Reuters | Comments

Planned Parenthood called on the FBI and the U.S. Department of Justice on Monday for help managing cybersecurity, following a report that the reproductive healthcare group's website had been hacked by anti-abortion activists.

TOPICS:
Researchers have devised a new method for stealing data that bypasses typical security protections for sensitive data — using the GSM network, electromagnetic waves and a basic low-end mobile phone.

Air-Gapped Computer Hacked With Simple Cell Phone

July 28, 2015 10:36 am | by Kim Zetter, Wired | Comments

Researchers have devised a new method for stealing data that bypasses typical security protections for sensitive data — using the GSM network, electromagnetic waves and a basic low-end mobile phone.

TOPICS:
The Obama administration has decided that the National Security Agency will soon stop examining — and will ultimately destroy — millions of American calling records it collected under a controversial program leaked by former agency contractor Edward Snowd

NSA Will Stop Looking at Old US Phone Records

July 28, 2015 10:16 am | by Ken Dilanian, Associated Press | Comments

The Obama administration has decided that the National Security Agency will soon stop examining — and will ultimately destroy — millions of American calling records it collected under a controversial program leaked by former agency contractor Edward Snowden.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading