Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Cyber attacks and cyber espionage are on the rise in Latin America, and the source of much of it is Brazilian hackers and Peruvian recent university graduates linking up with Russian-speaking experts, according to internet security analysts.

Bored Latin American Hackers Use Russian Skills at Home

September 1, 2015 | by Rosalba O'Brian, Reuters | Comments

Cyber attacks and cyber espionage are on the rise in Latin America, and the source of much of it is Brazilian hackers and Peruvian recent university graduates linking up with Russian-speaking experts, according to internet security analysts.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

Barclays Hacks Its Own Systems Before Criminals Do

September 2, 2015 1:12 pm | by Keila Guimaraes and Stephen Morris, Bloomberg | Comments

Barclays Plc is hacking its own computer systems to stay a step ahead of the criminals. Staying ahead of the bad guys requires resources, expertise and vigilance, and even that isn’t always enough.

TOPICS:
Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

Sneaky Adware Caught Accessing Users' Mac Keychain Without Permission

September 2, 2015 12:52 pm | by Dan Goodin, Ars Technica | Comments

Researchers have found a highly questionable installer accessing people's Mac keychain without permission.

TOPICS:
He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy

Vasectomy is New Clue in EMU Student's Bathtub Drowning

September 2, 2015 12:31 pm | by Katrease Stafford, Detroit Free Press | Comments

He's passed two polygraph tests. There's no DNA evidence linking him to the crime scene. And his wife and other immediate family members say police are looking at the wrong man. But allegations of sexual abuse, an FBI behavioral assessment and a vasectomy are among the evidence that led Ypsilanti police to name the stepfather of a murdered Eastern Michigan University student as a person of interest in their investigation.

TOPICS:
Advertisement
The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday.

Millions Hit by Personal Data Hack Still Have Not Been Told

September 2, 2015 11:07 am | by Mark Hosenball, Reuters | Comments

The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday.

TOPICS:
"Rocket Kitten" pro-Iranian regime hackers focusing more on targeting individuals for   geopolitical espionage.

Cyber Spies Impersonate Security Researcher

September 2, 2015 10:43 am | by Kelly Jackson Higgins, Dark Reading | Comments

A cyber espionage group likely out of Iran turned the tables on a security researcher who may have gotten a little too close to its operation: the attackers posed as the researcher in a spear-phishing email.

TOPICS:
A federal appeals court has ruled that Phoenix police officials acted reasonably in requiring three officers to provide DNA samples for an investigation into a sergeant's death.

Ruling Upholds Requirement for DNA Samples in Death Probe

September 1, 2015 2:52 pm | by The Associated Press | Comments

A federal appeals court has ruled that Phoenix police officials acted reasonably in requiring three officers to provide DNA samples for an investigation into a sergeant's death.

TOPICS:
Five months after the body of Alabama A&M doctoral student Lavanya Abburi was found floating in a pond at the school's research farm, investigators still don't know exactly how she died. Abburi's case - and hundreds of others awaiting forensic analysis st

Alabama Budget Cuts Could Shut Down Forensics Lab, Morgue

September 1, 2015 2:32 pm | by Crystal Bonvillian, AL.com | Comments

Five months after the body of Alabama A&M doctoral student Lavanya Abburi was found floating in a pond at the school's research farm, investigators still don't know exactly how she died. Abburi's case - and hundreds of others awaiting forensic analysis statewide - were dealt another blow on Monday, as Alabama Department of Forensic Sciences director Michael Sparks announced the possible closure of the Huntsville morgue.

TOPICS:
Distributed denial of service attacks have become a favorite tactic of cyber criminals, extortionists and protesters.

Old-Fashioned DDoS Favored Tactic of Many Cyber Attackers

September 1, 2015 1:24 pm | by Kevin G. Coleman, C4ISR & Networks | Comments

Distributed denial of service attacks have become a favorite tactic of cyber criminals, extortionists and protesters.

TOPICS:
Advertisement
The proliferation of new Web addresses has created a free-for-all as cyber criminals   race to spread malware or steal personal information with new sites, researchers say.

New Web Addresses a Cybercrime Playground

September 1, 2015 1:16 pm | by Katie Bo Williams, The Hill | Comments

The proliferation of new Web addresses has created a free-for-all as cyber criminals race to spread malware or steal personal information with new sites, researchers say. 

TOPICS:
Shaun Bridges, a former Secret Service agent who was investigating the Silk Road drug trafficking website, pled guilty today to charges of money laundering and obstruction of justice.

Secret Service Agent Pleads Guilty to Stealing Money From Silk Road Dealers

September 1, 2015 12:28 pm | by Joe Mullin, Ars Technica | Comments

Shaun Bridges, a former Secret Service agent who was investigating the Silk Road drug trafficking website, pled guilty today to charges of money laundering and obstruction of justice.

TOPICS:
Reconstructing the travel-movement of individuals can be important to many forensic investigations, spanning from homeland security issues at the national level to cold-case investigations at the local level. Analysis of stable isotopes recorded in human

Using Strontium Isotope Data in Hair Analysis

September 1, 2015 12:01 pm | by Brett J. Tipple, NIJ | Comments

Reconstructing the travel-movement of individuals can be important to many forensic investigations, spanning from homeland security issues at the national level to cold-case investigations at the local level. Analysis of stable isotopes recorded in human scalp hair at natural abundance levels has shown to be a useful tool to law enforcement and has assisted in the reconstruction of the recent geographic-movement histories of individuals.

TOPICS:
A northern Virginia teenager was sentenced Friday to more than 11 years in prison for helping another teen travel to Syria to join the Islamic State and for providing other aid to the militant group.

Teen Gets More Than 11 Years for Helping Islamic State

August 31, 2015 1:27 pm | by Jessica Gresko, Associated Press | Comments

A northern Virginia teenager was sentenced Friday to more than 11 years in prison for helping another teen travel to Syria to join the Islamic State and for providing other aid to the militant group.

TOPICS:
The Army is looking for soldiers and civilians to serve in new cyber units charged with protecting critical stateside infrastructure and creating “effects” on the battlefield in support of conventional forces. The challenge: Attracting the creative, energ

Army Creating Cyber Units With Soldiers, Civilians

August 31, 2015 1:18 pm | by Seth Robson, Stars and Stripes | Comments

The Army is looking for soldiers and civilians to serve in new cyber units charged with protecting critical stateside infrastructure and creating “effects” on the battlefield in support of conventional forces. The challenge: Attracting the creative, energetic talent typically drawn to the freewheeling tech sector.

TOPICS:
Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence o

China, Russia Using Hacked Data to Target US Spies

August 31, 2015 1:02 pm | by Brian Bennett and W.J. Hennigan, Los Angeles Times | Comments

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.

TOPICS:
After burglars grab the cash, the electronics and the jewels, they often linger in the victim’s home for a beer or a bite to eat. Scientists seize the opportunity to help catch them, using the latest technology to find traces of DNA on silverware, rims of

Crime Lab Zeroes In on Quality-of-Life Offenses

August 31, 2015 12:33 pm | by Shannon Prather, Star Tribune | Comments

After burglars grab the cash, the electronics and the jewels, they often linger in the victim’s home for a beer or a bite to eat. Scientists seize the opportunity to help catch them, using the latest technology to find traces of DNA on silverware, rims of bottles and cans, even half-eaten food.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading