Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidenc

Almost None of the Women in the Ashley Madison Database Ever Used the Site

August 27, 2015 | by Annalee Newitz, Gizmodo | Comments

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

Chemical Sampling Interface Features Simplicity, Speed

August 27, 2015 12:16 pm | by Oak Ridge National Laboratory | Comments

In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

TOPICS:
The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.

The US Military Gets a Guidebook to the Cloud

August 27, 2015 10:07 am | by Frank Konkel, Defense One | Comments

The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.  

TOPICS:
The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

Agora, the Dark Web's Biggest Drug Market, is Going Offline

August 27, 2015 8:18 am | by Andy Greenberg, Wired | Comments

The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

TOPICS:
Advertisement
The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control syst

Draft Guide Can Help Energy Companies Reduce Cyber Risk

August 27, 2015 8:18 am | by NIST | Comments

The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems. The center, part of the U.S. Commerce Department’s National Institute of Standards and Technology, works with IT developers and providers to help businesses reduce their cyber risk.

TOPICS:
Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

How Katrina Turned a Psychiatrist Into a Coroner

August 26, 2015 2:14 pm | by Katie Bishop and Anna Sale, The Atlantic | Comments

Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

TOPICS:
The popular code repository website GitHub was hit by a cyberattack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

GitHub Hit By DDoS Attack, Again

August 26, 2015 12:34 pm | by Lorenzo Franceschi-Bicchierai, Motherboard | Comments

The popular code repository website GitHub was hit by a cyber attack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

TOPICS:
Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

Ashley Madison Users in US Sue Cheating Website Over Breach

August 26, 2015 11:43 am | by Amanda Lee Myers, Associated Press | Comments

Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

TOPICS:
With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

IBM Advises Businesses to Block Tor

August 26, 2015 11:26 am | by Kelly Jackson Higgins, Dark Reading | Comments

With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

TOPICS:
Advertisement
Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

Symantec Publishes Crash Course in Car Security

August 26, 2015 11:14 am | by Mike Hine, Infosecurity Magazine | Comments

Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

TOPICS:
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years

How Security Flaws Work: The Buffer Overflow

August 26, 2015 11:01 am | by Peter Bright, Ars Technica | Comments

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems.

TOPICS:
Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsyc

Understanding Men Who Kill Intimate Partners

August 26, 2015 9:03 am | by Marla Paul, Northwestern University | Comments

Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsychology of these individuals. 

TOPICS:
The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data neede

Development in Analyzing Pediatric Cranial Fracture Trauma

August 26, 2015 8:50 am | by Todd Fenton, NIJ | Comments

The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data needed to more accurately interpret pediatric cranial trauma and determine whether it is consistent with abusive or accidental injury.

TOPICS:
Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be u

Determining the Age of Fingerprints

August 25, 2015 3:16 pm | by NIST | Comments

Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be used to give forensic scientists something they’ve long wished for: A way to date fingerprints.

TOPICS:
Cyber warfare has arrived: the Defense Department is under attack, and national security is at stake. Yet in a field defined by rapid growth, DOD arms itself at the same pace with which it buys major weapons, an acquisition cycle of seven to 10 years. The

Why Defense Department Can't Buy Cyber Stuff Fast Enough

August 25, 2015 12:29 pm | by Daniel E. Schoeni, Government Executive | Comments

Cyber warfare has arrived: the Defense Department is under attack, and national security is at stake. Yet in a field defined by rapid growth, DOD arms itself at the same pace with which it buys major weapons, an acquisition cycle of seven to 10 years. The Pentagon has been reluctant to adopt different methods for software than it uses for other acquisitions. But unless it does so, it will lose its edge.

TOPICS:
The cost of recovering from a security incident doubles when the attack affects virtual infrastructure, according to new research from Kaspersky Lab.

Attacks on Virtual Infrastructure Cause Double the Pain

August 25, 2015 12:03 pm | by Mike Hine, Infosecurity Magazine | Comments

The cost of recovering from a security incident doubles when the attack affects virtual infrastructure, according to new research from Kaspersky Lab.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading