An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group responsible for the attack is APT28.
According to the Post, "Of 28 examiners with the FBI Laboratory’s microscopic hair...
County and local police departments throughout New Jersey are employing technology to track...
Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.
Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.
A lesser known piece of that macabre history is the estimated 2 million or more who died, often slowly and agonizingly, one bullet at a time, at the hands of the Einsatzgruppen, the Ordnungspolizei and others.
The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.
Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.
The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to justice and protect the innocent.
IBM is making a move to open up more than two decades worth of cyber-threat intelligence via a new data-sharing exchange that is modeled off of social networking.
Cellebrite provided its Universal Forensic Extraction Device (UFED) units to the INTERPOL Digital Crime Centre (IDCC), to assist in retrieving evidence for the prosecution of suspects involved in a global online ‘sextortion’ scam.
Like a corporation that doesn't like government intrusion, the Iranian government seems to to be turning from aggression within regulated industry to a new warfare technology that has fewer restrictions.
Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flourish: under the cover of the Dark Web’s anonymity protections.
The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and professor of digital forensics, the report contained much erroneous information.
Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.
Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domestic Nuclear Detection Office.
The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.
The Pentagon will miss its own 2016 deadline to create cybersecurity teams to defend critical computer networks from hacking and they won’t be fully operational until 2018, a senior Defense Department official said.