Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use”

Most CIA Analysts Didn’t Know About NSA Spy Program

April 27, 2015 | by Cyrus Farivar, Ars Technica | Comments

A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities even several years after the September 11 attacks. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.

Romanian Police Breaks Up Cyber Gang That Stole Over $15M From Banks

April 28, 2015 11:49 am | by Lucian Constantin, CSO Online | Comments

Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyber thieves who hacked into banks, cloned payment cards and used them to steal over $15 million.  

TOPICS:
There are six men. All dressed in black like the ones in the famous movie. They have black cases too but they are not using their technology to erase your memory. Their name: NATO Rapid Reaction Team, or RRT. Their aim: to provide assistance to NATO natio

NATO's Cyber Men in Black

April 28, 2015 11:21 am | by NATO | Comments

There are six men. All dressed in black like the ones in the famous movie. They have black cases too but they are not using their technology to erase your memory. Their name: NATO Rapid Reaction Team, or RRT. Their aim: to provide assistance to NATO nations or facilities suffering a cyber attack.

TOPICS:
Yet another biometric authentication mechanism has proven to be fallible. It turns out that a flaw in the Samsung Galaxy S5 and other Android smartphones allows hackers to steal fingerprint data and clone prints for further attacks.

Galaxy S5 Flaw Allows Hackers to Steal and Clone Fingerprints

April 28, 2015 11:01 am | by Tara Seals, Infosecurity Magazine | Comments

Yet another biometric authentication mechanism has proven to be fallible. It turns out that a flaw in the Samsung Galaxy S5 and other Android smartphones allows hackers to steal fingerprint data and clone prints for further attacks.

TOPICS:
Advertisement
The falling price of Bitcoin is forcing ransomware masterminds to convert the crypto-currency as soon as they can. Rather than holding on to their ill-gotten BTC, criminals are simply laundering the ransom money as soon as possible.

Ransomware Thieves Ridding Themselves of Bitcoin Loot Quickly

April 28, 2015 10:51 am | by Iain Thomson, The Register | Comments

The falling price of Bitcoin is forcing ransomware masterminds to convert the crypto-currency as soon as they can. Rather than holding on to their ill-gotten BTC, criminals are simply laundering the ransom money as soon as possible.

TOPICS:
This study’s goal was to integrate Akonni’s Biosystems, Inc.’s patented sample   preparation (TruTip), thermocyling, and gel drop microarray (TruArray™) technologies   for the typing of SNPs in forensic applications. An Akonni integrated system would   ai

A Low Cost Microfluidic Microarray System for Typing SNPs

April 28, 2015 10:37 am | by Jennifer Reynolds, Christopher Cooney, Alex Kukhtin, Steve Garber, Nitu Thakore, Peter Qu, Jennifer Parker, Arial Bueno, Maria Belgrader and Phillip Belgrader, NIJ | Comments

This study’s goal was to integrate Akonni’s Biosystems, Inc.’s patented sample preparation (TruTip), thermocyling, and gel drop microarray (TruArray) technologies for the typing of SNPs in forensic applications. An Akonni integrated system would aid in rapidly apprehending a perpetrator or identifying a victim.

TOPICS:
Police forces across the UK are testing technology that allows officers to analyse DNA samples in custody suites, amid fears that civil liberties could be infringed and evidence compromised.

Hi-tech DNA Machines Cause Concern

April 27, 2015 2:59 pm | by Oscar Quine, Independent Online | Comments

Police forces across the UK are testing technology that allows officers to analyse DNA samples in custody suites, amid fears that civil liberties could be infringed and evidence compromised.

TOPICS:
Champlain College has been recognized for the second time as winner of the Professional Award for Best Cybersecurity Higher Education Program at the 2015 SC Awards. The award was presented during the 2015 SC Awards Gala held in San Francisco.

Champlain College Awarded for Best Cybersecurity Higher Education Program

April 27, 2015 12:46 pm | by Champlain College | Comments

Champlain College has been recognized for the second time as winner of the Professional Award for Best Cybersecurity Higher Education Program at the 2015 SC Awards. The award was presented during the 2015 SC Awards Gala held in San Francisco.

TOPICS:
The cybersecurity workforce gap has been well-documented — and cultivating the next generation of cyber workers, the Millennials, from an early age has been widely seen as a mandate for continued industry viability.

Recruiting the Next-Generation Cyber Workforce

April 24, 2015 12:58 pm | by Tara Seals, Infosecurity Magazine | Comments

The cybersecurity workforce gap has been well-documented — and cultivating the next generation of cyber workers, the Millennials, from an early age has been widely seen as a mandate for continued industry viability.

TOPICS:
Advertisement
Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

Spies Like Us: German Intelligence Helps the NSA

April 24, 2015 12:22 pm | by Glyn Moody, Ars Technica | Comments

Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel.

TOPICS:
Defense Secretary Ash Carter announced new partnership initiatives on the first day of a two-day visit to California's Silicon Valley to learn from experts who run some of the highest-tech companies in one of the nation's innovation hotspots.

Defense Secretary Seeks Tech-Sector Partnerships for Innovation

April 24, 2015 11:56 am | by Cheryl Pellerin, Associated Press | Comments

Defense Secretary Ash Carter announced new partnership initiatives on the first day of a two-day visit to California's Silicon Valley to learn from experts who run some of the highest-tech companies in one of the nation's innovation hotspots.

TOPICS:
While the world of 3D printing is still in a fairly lawless, unregulated state (one to be enjoyed while it lasts by those on the right side of the law), that doesn’t mean it can’t be used to the law’s benefit.

3D Printed Beer Bottle Instrumental Evidence in UK Murder Conviction

April 24, 2015 10:05 am | by Bridget Butler Millsaps, 3DPrint.com | Comments

While the world of 3D printing is still in a fairly lawless, unregulated state (one to be enjoyed while it lasts by those on the right side of the law), that doesn’t mean it can’t be used to the law’s benefit.

TOPICS:
The contradiction in the debate over whether law enforcement should have guaranteed access to data while still advocating privacy is not easily reconciled.

Encryption Keys to Turn the House Around

April 23, 2015 12:35 pm | by Ernie Austin, Associate Editor | Comments

The contradiction in the debate over whether law enforcement should have guaranteed access to data while still advocating privacy is not easily reconciled.

TOPICS:
CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the a

The Rise of Counterintelligence in Malware Investigations

April 23, 2015 11:47 am | by John Bambenek, Dark Reading | Comments

CTI is the application of intelligence tactics to gain insights on adversarial actors and their tools, techniques, and procedures. However, one aspect that’s not frequently discussed is the use of counterintelligence tactics by both the defender and the adversary.

TOPICS:
On Monday, the FBI released what was almost certainly a painful admission. The vast majority of the agents that it had sent to court to testify about a specific forensic analysis had submitted erroneous statements to the court. In its preliminary review o

The Science (and lack thereof) Behind the FBI's Retreat on Hair Analysis

April 23, 2015 11:20 am | by John Timmer, Ars Technica | Comments

On Monday, the FBI released what was almost certainly a painful admission. The vast majority of the agents that it had sent to court to testify about a specific forensic analysis had submitted erroneous statements to the court. In its preliminary review of relevant cases, at least 90 percent of them were problematic.

TOPICS:
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations t

New Pentagon Strategy Warns of Cyberwar Capabilities

April 23, 2015 11:00 am | by Lolita C. Baldor, Associated Press | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyber warfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading