Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidenc

Almost None of the Women in the Ashley Madison Database Ever Used the Site

August 27, 2015 | by Annalee Newitz, Gizmodo | Comments

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

When cyber crime pops up in the news, it’s often accompanied by footage of dramatic raids, or grand press conferences held by law enforcement. This time, however, the National Crime Agency (NCA) — which is essentially the UK's version of the FBI — has tak

Six Lizard Squad Suspects Arrested, 50 More Given a Lecture

August 28, 2015 11:28 am | by Joseph Cox, Motherboard | Comments

When cyber crime pops up in the news, it’s often accompanied by footage of dramatic raids, or grand press conferences held by law enforcement. This time, however, the National Crime Agency (NCA) — which is essentially the UK's version of the FBI — has taken a different approach.

TOPICS:
A former intern at security firm FireEye has admitted in federal court that he designed a malicious software tool that allowed attackers to take control of other Android phones so they could spy on their owners.

Former Security Intern Admits Developing Super-Stealthy Android Spyware

August 28, 2015 10:57 am | by Dan Goodin, Ars Technica | Comments

A former intern at security firm FireEye has admitted in federal court that he designed a malicious software tool that allowed attackers to take control of other Android phones so they could spy on their owners.

TOPICS:
Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus ne

Associated Press Sues After FBI Impersonates Journalist in Sting Operation

August 28, 2015 10:35 am | by Mary Ann Toman-Miller, Los Angeles Times | Comments

Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus news story and impersonated an AP journalist.

TOPICS:
Advertisement
The murder suspect at the center of a national immigration debate admits he fired the shot that killed a young San Francisco woman on an evening stroll with her father. The question remains whether he purposely aimed the gun at Kate Steinle, 32, or accide

Fatal Shot in San Francisco Pier Shooting Was Ricochet, Expert Testifies

August 28, 2015 10:12 am | by Paul Elias, Associated Press | Comments

The murder suspect at the center of a national immigration debate admits he fired the shot that killed a young San Francisco woman on an evening stroll with her father. The question remains whether he purposely aimed the gun at Kate Steinle, 32, or accidentally fired the weapon.

TOPICS:
In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

Chemical Sampling Interface Features Simplicity, Speed

August 27, 2015 12:16 pm | by Oak Ridge National Laboratory | Comments

In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

TOPICS:
The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.

The US Military Gets a Guidebook to the Cloud

August 27, 2015 10:07 am | by Frank Konkel, Defense One | Comments

The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.  

TOPICS:
The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

Agora, the Dark Web's Biggest Drug Market, is Going Offline

August 27, 2015 8:18 am | by Andy Greenberg, Wired | Comments

The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

TOPICS:
The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control syst

Draft Guide Can Help Energy Companies Reduce Cyber Risk

August 27, 2015 8:18 am | by NIST | Comments

The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems. The center, part of the U.S. Commerce Department’s National Institute of Standards and Technology, works with IT developers and providers to help businesses reduce their cyber risk.

TOPICS:
Advertisement
Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

How Katrina Turned a Psychiatrist Into a Coroner

August 26, 2015 2:14 pm | by Katie Bishop and Anna Sale, The Atlantic | Comments

Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

TOPICS:
The popular code repository website GitHub was hit by a cyberattack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

GitHub Hit By DDoS Attack, Again

August 26, 2015 12:34 pm | by Lorenzo Franceschi-Bicchierai, Motherboard | Comments

The popular code repository website GitHub was hit by a cyber attack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

TOPICS:
Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

Ashley Madison Users in US Sue Cheating Website Over Breach

August 26, 2015 11:43 am | by Amanda Lee Myers, Associated Press | Comments

Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

TOPICS:
With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

IBM Advises Businesses to Block Tor

August 26, 2015 11:26 am | by Kelly Jackson Higgins, Dark Reading | Comments

With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

TOPICS:
Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

Symantec Publishes Crash Course in Car Security

August 26, 2015 11:14 am | by Mike Hine, Infosecurity Magazine | Comments

Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

TOPICS:
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years

How Security Flaws Work: The Buffer Overflow

August 26, 2015 11:01 am | by Peter Bright, Ars Technica | Comments

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems.

TOPICS:
Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsyc

Understanding Men Who Kill Intimate Partners

August 26, 2015 9:03 am | by Marla Paul, Northwestern University | Comments

Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsychology of these individuals. 

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading