Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely

US Court Says Drug-Sniffing Dog Fails the Smell Test

July 30, 2015 | by Michael Tarm, Associated Press | Comments

Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely on their K-9 partners to justify searches when a dog's own competence, as in Lex's case, is itself suspect.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

New technology promises to make a workhorse lab tool cheaper, more portable and many times faster by accelerating the heating and cooling of genetic samples with the switch of a light.

Heating and Cooling With Light Leads to Ultrafast DNA Diagnostics

August 4, 2015 8:16 am | by Sarah Yang, UC Berkeley | Comments

New technology promises to make a workhorse lab tool cheaper, more portable and many times faster by accelerating the heating and cooling of genetic samples with the switch of a light.

TOPICS:
For more than 20 years, Boone County Sheriff Mike Nielsen has been haunted by the death of an unidentified young woman. But, Nielsen hopes recent advances in DNA technology may finally help detectives solve the case.

Unsolved Murder Leads to Exhumation of Woman Killed in 1992

August 3, 2015 2:55 pm | Comments

For more than 20 years, Boone County Sheriff Mike Nielsen has been haunted by the death of an unidentified young woman. But, Nielsen hopes recent advances in DNA technology may finally help detectives solve the case.

TOPICS:
A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings. The vehicle was on loan to them from a carmaker, and the goal was to find out how hackable it was.

The Cyber Mechanics Who Protect Your Car From Hackers

August 3, 2015 12:18 pm | by Chris Baraniuk, New Scientist | Comments

A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings. The vehicle was on loan to them from a carmaker, and the goal was to find out how hackable it was. The team did not need to physically connect to the vehicle or even enter it – they simply jacked in over Wi-Fi. When they did, they soon found an unexpected vulnerability.

TOPICS:
Advertisement
Numerous firms across the financial services sector - and beyond - continue to face a variety of distributed-denial-of-attack and data breach extortion attempts.

FBI to Banks: DDoS Extortions Continue

August 3, 2015 11:56 am | by Mathew J. Schwartz, Gov Info Security | Comments

Numerous firms across the financial services sector - and beyond - continue to face a variety of distributed-denial-of-attack and data breach extortion attempts.

TOPICS:
The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true.

Researchers Create First Firmware Worm That Attacks Macs

August 3, 2015 11:20 am | by Kim Zetter, Wired | Comments

The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. 

TOPICS:
NBC has released a 2014 slide from a secret NSA Threat Operations Center (NTOC)   briefing—a map that shows the locations of "every single successful computer   intrusion" by Chinese state-sponsored hackers over a five-year period. More than 600   US busi

NSA Report Shows China Hacked 600+ US Targets Over 5 Years

August 3, 2015 10:23 am | by Sean Gallagher, Ars Technica | Comments

NBC has released a 2014 slide from a secret NSA Threat Operations Center (NTOC) briefing—a map that shows the locations of "every single successful computer intrusion" by Chinese state-sponsored hackers over a five-year period. More than 600 US businesses and institutions were breached during that period.

TOPICS:
The head of the failed Japan-based bitcoin exchange Mt. Gox was arrested in Tokyo on Saturday on suspicion of inflating his cash account by $1 million, authorities said.

Head of Failed Japan-Based Bitcoin Exchange Mt. Gox Arrested

August 3, 2015 10:01 am | by Yuri Kageyama, Associated Press | Comments

The head of the failed Japan-based bitcoin exchange Mt. Gox was arrested in Tokyo on Saturday on suspicion of inflating his cash account by $1 million, authorities said.

TOPICS:
The small arthropods clinging to a piece of aircraft debris that washed ashore on an Indian Ocean island may provide valuable evidence in the disappearance of a Malaysia Airlines plane, one of the greatest aviation mysteries in history.

Barnacle Forensics May Unlock Clues in Missing Malaysian Plane

July 31, 2015 2:09 pm | by Alan Levin, Bloomberg | Comments

The small arthropods clinging to a piece of aircraft debris that washed ashore on an Indian Ocean island may provide valuable evidence in the disappearance of a Malaysia Airlines plane, one of the greatest aviation mysteries in history.

TOPICS:
Advertisement
The FBI is struggling to attract computer scientists to its cybersecurity program mainly due to low pay, a report by the U.S. Department of Justice showed, highlighting weaknesses in a flagship initiative to tackle growing cyber threats.

FBI Understaffed to Tackle Cyber Threats, Says Watchdog

July 31, 2015 12:34 pm | by Lindsay Dunsmuir, Reuters | Comments

The FBI is struggling to attract computer scientists to its cybersecurity program mainly due to low pay, a report by the U.S. Department of Justice showed, highlighting weaknesses in a flagship initiative to tackle growing cyber threats.

TOPICS:
A recently disclosed vulnerability in Bind, the most widely used software for translating human-friendly domain names into IP addresses used by servers, makes it possible for lone-wolf attackers to bring down huge swaths of the Internet, a security resear

Major Flaw Could Let Lone-Wolf Hacker Bring Down Huge Swaths of Internet

July 31, 2015 10:10 am | by Dan Goodin, Ars Technica | Comments

A recently disclosed vulnerability in Bind, the most widely used software for translating human-friendly domain names into IP addresses used by servers, makes it possible for lone-wolf attackers to bring down huge swaths of the Internet, a security researcher has warned.

TOPICS:
Capt. James McColl and Capt. Justin Lanahan are cyber officers, part of the newly created 17-series Army branch. Both participated in a week-long "hackathon" in Arlington, Virginia, July 20-24, in support of continued development of "Plan X," a four-year,

New Army Cyber Officers Hack Improvements Into DARPA's 'Plan X'

July 31, 2015 9:55 am | by C. Todd Lopez, U.S. Army | Comments

Capt. James McColl and Capt. Justin Lanahan are cyber officers, part of the newly created 17-series Army branch. Both participated in a week-long "hackathon" in Arlington, Virginia, July 20-24, in support of continued development of "Plan X," a four-year, $120-million program at the Defense Advanced Research Projects Agency, or DARPA.

TOPICS:
A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

Can't Touch Russian 'Hammertoss'

July 30, 2015 10:14 am | by Kelly Jackson Higgins, Dark Reading | Comments

A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

TOPICS:
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize thei

Why Russian Cybercrime Markets are Thriving

July 30, 2015 9:43 am | by Mathew J. Schwartz, Gov Info Security | Comments

The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize their efforts.

TOPICS:
The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

Wassenaar Arrangement Goes Back to the Drawing Board

July 30, 2015 9:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

TOPICS:
United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.

United Airlines Hacked by Same Group That Breached Anthem and OPM

July 30, 2015 9:08 am | by Zeljka Zorz, Help Net Security | Comments

United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.  

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading