When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were.
Austrian police on Thursday discovered the decomposing bodies of at least 20 — and possibly up...
Belittled by the judge and jeered by spectators, James Holmes was sent to prison for the rest of...
Recent high-profile child-porn arrests in Louisville and Indiana momentarily focus a spotlight...
In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.
The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.
The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.
The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems. The center, part of the U.S. Commerce Department’s National Institute of Standards and Technology, works with IT developers and providers to help businesses reduce their cyber risk.
Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.
The popular code repository website GitHub was hit by a cyber attack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.
Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.
With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.
Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems.
Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsychology of these individuals.
The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data needed to more accurately interpret pediatric cranial trauma and determine whether it is consistent with abusive or accidental injury.
Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be used to give forensic scientists something they’ve long wished for: A way to date fingerprints.
Cyber warfare has arrived: the Defense Department is under attack, and national security is at stake. Yet in a field defined by rapid growth, DOD arms itself at the same pace with which it buys major weapons, an acquisition cycle of seven to 10 years. The Pentagon has been reluctant to adopt different methods for software than it uses for other acquisitions. But unless it does so, it will lose its edge.
The cost of recovering from a security incident doubles when the attack affects virtual infrastructure, according to new research from Kaspersky Lab.