Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Social media giants including Twitter, Yahoo, Facebook and Google are pushing back against Senate legislation that would require them to alert federal authorities of any terrorist activity, according to industry and government officials.

Social Media Companies Fear Liability With Terrorism Bill

July 28, 2015 | by Anne Flaherty, Associated Press | Comments

Social media giants including Twitter, Yahoo, Facebook and Google are pushing back against Senate legislation that would require them to alert federal authorities of any terrorist activity, according to industry and government officials.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Highly advanced criminal investigation methods used by Japanese police departments are gradually taking hold in Thailand, largely thanks to instruction given over a period of about 20 years to Thai police by a former crime scene investigator of the Metrop

Former Japanese Police Officer Teaches Forensics in Thailand

July 30, 2015 12:03 pm | by The Japan Times | Comments

Highly advanced criminal investigation methods used by Japanese police departments are gradually taking hold in Thailand, largely thanks to instruction given over a period of about 20 years to Thai police by a former crime scene investigator of the Metropolitan Police Department.

TOPICS:
Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely

US Court Says Drug-Sniffing Dog Fails the Smell Test

July 30, 2015 11:05 am | by Michael Tarm, Associated Press | Comments

Lex the police dog from central Illinois is far from top dog in drug-sniffing skills. That's the core finding of a potentially influential new ruling from the 7th U.S. Circuit Court of Appeals, which considered the question of how much police should rely on their K-9 partners to justify searches when a dog's own competence, as in Lex's case, is itself suspect.

TOPICS:
A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

Can't Touch Russian 'Hammertoss'

July 30, 2015 10:14 am | by Kelly Jackson Higgins, Dark Reading | Comments

A recently discovered Russian cyber espionage operation camouflages its nefarious activity by employing a combination of legitimate services such as Twitter, Github, and cloud storage - often pilfering information during a victim organization's work day.

TOPICS:
Advertisement
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize thei

Why Russian Cybercrime Markets are Thriving

July 30, 2015 9:43 am | by Mathew J. Schwartz, Gov Info Security | Comments

The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, because they help attackers quickly and affordably organize their efforts.

TOPICS:
The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

Wassenaar Arrangement Goes Back to the Drawing Board

July 30, 2015 9:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

The US government has decided to trash its controversial proposals for restrictions on the export of intrusion software and start again.

TOPICS:
United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.

United Airlines Hacked by Same Group That Breached Anthem and OPM

July 30, 2015 9:08 am | by Zeljka Zorz, Help Net Security | Comments

United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment information of 78.8 million customers and non-customers.  

TOPICS:
About two weeks into last year's conflict in Gaza, Palestinian photographer Jehad Saftawi began to tire of venturing into the city every day to take images of the wreckage. He decided instead to set up a video camera showing the Gaza skyline in his apartm

Gaza Destruction Comes Under Forensic Lens in Amnesty Report

July 29, 2015 11:16 am | by Tristan Martin, Reuters | Comments

About two weeks into last year's conflict in Gaza, Palestinian photographer Jehad Saftawi began to tire of venturing into the city every day to take images of the wreckage. He decided instead to set up a video camera showing the Gaza skyline in his apartment. A year on, Amnesty International says evidence collected by Saftawi and others shows that Israeli forces carried out war crimes in retaliation for the capture of an Israeli soldier.

TOPICS:
The military on Monday exhumed more caskets containing the unidentified remains of USS Oklahoma crew members killed in the 1941 bombing of Pearl Harbor. A lab in Hawaii will identify some remains using dental records. The remains will then be sent to anot

Remains of Pearl Harbor Victims Raised for Identification

July 29, 2015 10:32 am | by Audrey McAvoy, Associated Press | Comments

The military on Monday exhumed more caskets containing the unidentified remains of USS Oklahoma crew members killed in the 1941 bombing of Pearl Harbor. A lab in Hawaii will identify some remains using dental records. The remains will then be sent to another lab in Omaha for DNA analysis.

Advertisement
In its three years in operation, the Iowa Division of Criminal Investigation’s Cold Case Unit brought to close two unsolved homicide cases dating as far back as the 1970s. The unit was shut down in 2011 after the federal grant that funded it ran out. But

Cold Case Unit's End Didn't Stop Search for DNA Profiles

July 29, 2015 8:28 am | by Jeff Reinitz, Globe Gazette | Comments

In its three years in operation, the Iowa Division of Criminal Investigation’s Cold Case Unit brought to close two unsolved homicide cases dating as far back as the 1970s. The unit was shut down in 2011 after the federal grant that funded it ran out. But DCI officials said they continue to investigate homicides cases that have gone years, or even decades, without justice.

TOPICS:
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

Darkode Cyber Crime Forum Might be Making a Comeback

July 29, 2015 8:24 am | by Lucian Constantin, IT World | Comments

The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

TOPICS:
One of the most dangerous vulnerabilities to hit the Android scene ever has been uncovered: Dubbed Stagefright, the flaw makes all Android devices targets of remote take-over by simply receiving an MMS message, without even having to open or view it.

'Heartbleed for Mobile' Hits Android

July 29, 2015 8:24 am | by Tara Seals, Infosecurity Magazine | Comments

One of the most dangerous vulnerabilities to hit the Android scene ever has been uncovered: Dubbed Stagefright, the flaw makes all Android devices targets of remote take-over by simply receiving an MMS message, without even having to open or view it.

TOPICS:
An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was busi

Group That Hacked Anthem Shared Weaponized 0-Days With Rival Attackers

July 29, 2015 8:23 am | by Dan Goodin, Ars Technica | Comments

An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was business as usual for the hacking group, which over the past three years has carried out more than a dozen similar attacks.

TOPICS:
Maybe we should take the warnings of RoboCop more seriously. Famous scientists, engineers, and businessmen are banding together to call for a ban on autonomous weapons development.

The Scientists and Technologists Who Want to Keep AI Out of Weapons

July 29, 2015 8:22 am | by Mike Murphy, Defense One | Comments

Maybe we should take the warnings of RoboCop more seriously. Famous scientists, engineers and businessmen are banding together to call for a ban on autonomous weapons development.

TOPICS:
Planned Parenthood called on the FBI and the U.S. Department of Justice on Monday for help managing cybersecurity, following a report that the reproductive healthcare group's website had been hacked by anti-abortion activists.

Planned Parenthood Investigating Claims of Website Hack

July 28, 2015 10:51 am | by Megan Cassela, Reuters | Comments

Planned Parenthood called on the FBI and the U.S. Department of Justice on Monday for help managing cybersecurity, following a report that the reproductive healthcare group's website had been hacked by anti-abortion activists.

TOPICS:
Researchers have devised a new method for stealing data that bypasses typical security protections for sensitive data — using the GSM network, electromagnetic waves and a basic low-end mobile phone.

Air-Gapped Computer Hacked With Simple Cell Phone

July 28, 2015 10:36 am | by Kim Zetter, Wired | Comments

Researchers have devised a new method for stealing data that bypasses typical security protections for sensitive data — using the GSM network, electromagnetic waves and a basic low-end mobile phone.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading