Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Cyber attacks and cyber espionage are on the rise in Latin America, and the source of much of it is Brazilian hackers and Peruvian recent university graduates linking up with Russian-speaking experts, according to internet security analysts.

Bored Latin American Hackers Use Russian Skills at Home

September 1, 2015 | by Rosalba O'Brian, Reuters | Comments

Cyber attacks and cyber espionage are on the rise in Latin America, and the source of much of it is Brazilian hackers and Peruvian recent university graduates linking up with Russian-speaking experts, according to internet security analysts.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

After several years of internal debate, the Pentagon decided this spring to disinter 61 caskets holding the remains of up to 388 unidentified USS Oklahoma service members. The identifications — which investigators think will take five years — are also lik

Offutt Lab Helping ID Remains of Men Killed at Pearl Harbor

September 3, 2015 12:32 pm | by Steve Liewer, Omaha World-Herald | Comments

After several years of internal debate, the Pentagon decided this spring to disinter 61 caskets holding the remains of up to 388 unidentified USS Oklahoma service members. The identifications — which investigators think will take five years — are also likely to spur identifications of many other “unknown” remains resting in military cemeteries around the world. 

TOPICS:
Thai police said Wednesday a prime suspect in Bangkok's deadly bombing has admitted to being near the shrine where the attack took place but denied placing the bomb, as other clues increasingly linked the blast to Thailand's forced repatriation of members

Thai Bomb Suspect Near Scene, Prints Match Bomb Material

September 3, 2015 11:57 am | by Nattasuda Anusonadisai and Jocelyn Decker, Associated Press | Comments

Thai police said Wednesday a prime suspect in Bangkok's deadly bombing has admitted to being near the shrine where the attack took place but denied placing the bomb, as other clues increasingly linked the blast to Thailand's forced repatriation of members of a minority ethnic group to China.

TOPICS:
Tanya Smith could not believe her eyes as she watched her computer being operated by a hacker somewhere in cyberspace. Bright green text scrolled against the black computer screen as the hacker typed away furiously in front of her. She was helpless to sto

Hacker Stuns Ohio Family With Computer Takeover

September 3, 2015 10:03 am | by Julie E. Martin, Trib Live | Comments

Tanya Smith could not believe her eyes as she watched her computer being operated by a hacker somewhere in cyberspace. Bright green text scrolled against the black computer screen as the hacker typed away furiously in front of her. She was helpless to stop it — her keyboard and mouse rendered useless by the intruder.

TOPICS:
Advertisement
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. Of little surprise has been the continued lack of importance a large number of companies, and

How Cyber Crime Has Changed Over the Past 5 Years (It Hasn’t Got Any Better)

September 3, 2015 9:20 am | by David Glance, The Conversation | Comments

Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. Of little surprise has been the continued lack of importance a large number of companies, and individuals, have placed on implementing basic security practices like applying updates to software and implementing policies around passwords.

TOPICS:
Over 190.3 million people in the US own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Mobile malware is spiking, and is all too often pre-installed on a user’s device.

26 Mobile Phone Models Contain Pre-Installed Spyware

September 3, 2015 8:44 am | by Tara Seals, Infosecurity Magazine | Comments

Over 190.3 million people in the US own smartphones, but many do not know exactly what a mobile device can disclose to third parties about its owner. Mobile malware is spiking, and is all too often pre-installed on a user’s device.

TOPICS:
Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

Barclays Hacks Its Own Systems Before Criminals Do

September 2, 2015 1:12 pm | by Keila Guimaraes and Stephen Morris, Bloomberg | Comments

Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

TOPICS:
Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

Sneaky Adware Caught Accessing Users' Mac Keychain Without Permission

September 2, 2015 12:52 pm | by Dan Goodin, Ars Technica | Comments

Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

TOPICS:
He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy

Vasectomy is New Clue in EMU Student's Bathtub Drowning

September 2, 2015 12:31 pm | by Katrease Stafford, Detroit Free Press | Comments

He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy are among the evidence that led Ypsilanti police to name the stepfather of a murdered Eastern Michigan University student as a person of interest in their investigation.

TOPICS:
Advertisement
The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday.

Millions Hit by Personal Data Hack Still Have Not Been Told

September 2, 2015 11:07 am | by Mark Hosenball, Reuters | Comments

The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday.

TOPICS:
"Rocket Kitten" pro-Iranian regime hackers focusing more on targeting individuals for   geopolitical espionage.

Cyber Spies Impersonate Security Researcher

September 2, 2015 10:43 am | by Kelly Jackson Higgins, Dark Reading | Comments

A cyber espionage group likely out of Iran turned the tables on a security researcher who may have gotten a little too close to its operation: the attackers posed as the researcher in a spear-phishing email.

TOPICS:
A federal appeals court has ruled that Phoenix police officials acted reasonably in requiring three officers to provide DNA samples for an investigation into a sergeant's death.

Ruling Upholds Requirement for DNA Samples in Death Probe

September 1, 2015 2:52 pm | by The Associated Press | Comments

A federal appeals court has ruled that Phoenix police officials acted reasonably in requiring three officers to provide DNA samples for an investigation into a sergeant's death.

TOPICS:
Five months after the body of Alabama A&M doctoral student Lavanya Abburi was found floating in a pond at the school's research farm, investigators still don't know exactly how she died. Abburi's case - and hundreds of others awaiting forensic analysis st

Alabama Budget Cuts Could Shut Down Forensics Lab, Morgue

September 1, 2015 2:32 pm | by Crystal Bonvillian, AL.com | Comments

Five months after the body of Alabama A&M doctoral student Lavanya Abburi was found floating in a pond at the school's research farm, investigators still don't know exactly how she died. Abburi's case - and hundreds of others awaiting forensic analysis statewide - were dealt another blow on Monday, as Alabama Department of Forensic Sciences director Michael Sparks announced the possible closure of the Huntsville morgue.

TOPICS:
Distributed denial of service attacks have become a favorite tactic of cyber criminals, extortionists and protesters.

Old-Fashioned DDoS Favored Tactic of Many Cyber Attackers

September 1, 2015 1:24 pm | by Kevin G. Coleman, C4ISR & Networks | Comments

Distributed denial of service attacks have become a favorite tactic of cyber criminals, extortionists and protesters.

TOPICS:
The proliferation of new Web addresses has created a free-for-all as cyber criminals   race to spread malware or steal personal information with new sites, researchers say.

New Web Addresses a Cybercrime Playground

September 1, 2015 1:16 pm | by Katie Bo Williams, The Hill | Comments

The proliferation of new Web addresses has created a free-for-all as cyber criminals race to spread malware or steal personal information with new sites, researchers say. 

TOPICS:
Shaun Bridges, a former Secret Service agent who was investigating the Silk Road drug trafficking website, pled guilty today to charges of money laundering and obstruction of justice.

Secret Service Agent Pleads Guilty to Stealing Money From Silk Road Dealers

September 1, 2015 12:28 pm | by Joe Mullin, Ars Technica | Comments

Shaun Bridges, a former Secret Service agent who was investigating the Silk Road drug trafficking website, pled guilty today to charges of money laundering and obstruction of justice.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading