Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with T

Malaysian Forensics Teams Dig Up Graves at Traffickers' Camp

May 27, 2015 | by Eileen Ng, Associated Press | Comments

Malaysian forensics teams exhumed a body from a shallow grave at an abandoned jungle camp used by human traffickers, the first of what police predicted would be more grim findings as they search through a cluster of illicit hideouts near the border with Thailand.

View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

Canary Box Aims to Lure Hackers Into Honeypots Before They Make Headlines

May 27, 2015 10:37 am | by Peter Bright, Ars Technica | Comments

South African security firm Thinkst is hoping to give new life to an old idea — the honeypot — in a bid to help organizations detect security breaches and intruders in their private networks.

TOPICS:
The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

Total Cost of Average Data Breach Reaches $3.8 Million

May 27, 2015 9:12 am | by Mirko Zorz, Help Net Security | Comments

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.

TOPICS:
Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

IRS Says Thieves Stole Tax Info From 100,000

May 27, 2015 8:47 am | by Stephen Ohlemacher, Associated Press | Comments

Sophisticated criminals used an online service run by the IRS to access personal tax information from more than 100,000 taxpayers, part of an elaborate scheme to steal identities and claim fraudulent tax refunds, the IRS said Tuesday.

TOPICS:
Advertisement

The Mystery of the Torso in Buffalo Cave

May 26, 2015 1:13 pm | by Brendan I. Koerner, Wired | Comments

In August 1979, a family hunting arrowheads dug up a headless male torso deep within a rock-strewn cave. The torso, wrapped in burlap and clad in a pink shirt and maroon sweater, was found in a grave 18 inches deep.

TOPICS:
The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

Moving Beyond 'Medieval' Cybersecurity

May 26, 2015 10:42 am | by Andrew Careaga, Missouri S&T | Comments

The nation’s approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security expert at Missouri University of Science and Technology.

TOPICS:
China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.”

China's Military Has Declared War on Western Thought on the Internet

May 26, 2015 10:08 am | by Lily Kuo, Quartz | Comments

China’s military says the internet has become its main ideological battlefield and that it should build a “Great Wall” online to protect the country’s citizens from “hostile Western forces.” 

TOPICS:
The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

NSA Winds Down Once-Secret Phone-Records Collection Program

May 26, 2015 9:40 am | by Ken Dilanian, Associated Press | Comments

The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration at the end of the month.

TOPICS:

The Germ at the Scene of the Crime

May 26, 2015 9:24 am | by Viviane Richter, Cosmos | Comments

The germs you  pick up at a crime scene may one day land you in jail. Microbiologist Jack Gilbert and his team at the Argonne National Laboratory in Chicago have shown that bacteria clinging to the sole of your shoe could be a microscopic smoking gun that tells crime scene investigators where you’ve been.

TOPICS:
Advertisement

Should Texts, E-mail, Tweets and Facebook Posts Be the New Fingerprints in Court?

May 26, 2015 9:15 am | by Frances Stead Sellers, Washington Post | Comments

In an episode of the CBS show “Criminal Minds” that aired last year, an FBI team is on a frantic hunt for a missing 4-year-old. The team soon realizes that the girl has been given away by a relative, Sue, and that there’s no way Sue is going to reveal her whereabouts.

TOPICS:
As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over time to become even more lethal. So, departments of the U.S. Army came up with a plan to provi

Soldiers Help Identify New IED Threats Using Forensics

May 22, 2015 2:07 pm | by David Vergun, U.S. Army | Comments

As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over time to become even more lethal. So, departments of the U.S. Army came up with a plan to provide training and equipment to frontline Soldiers - particularly explosives ordnance personnel - to do forensics to speed up investigations.

Heart disease and cancer are overwhelmingly the most common causes of death in the United States. But researchers always like to dig deeper in to health trends than that. A new map, published by the CDC, shows the illnesses and accidents that disproportio

CDC Death Map Shows Each State's Most Common Killer

May 22, 2015 1:21 pm | by Marissa Fessenden, Smithsonian | Comments

Heart disease and cancer are overwhelmingly the most common causes of death in the United States. But researchers always like to dig deeper in to health trends than that. A new map, published by the CDC, shows the illnesses and accidents that disproportionately claim people in each state. 

TOPICS:
The Hatton Garden heist was a daring raid that involved climbing down lift shafts,   drilling through a reinforced concrete wall, gaining entry to a secure vault and   breaking numerous secure metal safe boxes before making away with valuables, right   un

How to Solve a Jewel Heist (and Why It Takes So Long)

May 22, 2015 11:46 am | by Emma Rixon, Tne Conversation | Comments

The Hatton Garden heist was a daring raid that involved climbing down lift shafts, drilling through a reinforced concrete wall, gaining entry to a secure vault and breaking numerous secure metal safe boxes before making away with valuables, right under the noses of security and police. But the investigation moved from snail’s, to making several charges in 48 hours. So what goes on and why is it all so slow?

TOPICS:
The hunt for a registered sex offender suspected of killing his ex-girlfriend and her son intensified Thursday after police raided but failed to find anyone inside a home in western Missouri, where the man was charged last month for allegedly keeping the

Police: Woman Held in Box for Months Found Dead, Man Sought

May 22, 2015 11:14 am | Comments

The hunt for a registered sex offender suspected of killing his ex-girlfriend and her son intensified Thursday after police raided but failed to find anyone inside a home in western Missouri, where the man was charged last month for allegedly keeping the woman confined in a wooden box.

TOPICS:
Jurors in the Colorado theater shooting case on Thursday viewed autopsy photos of some of the 12 people who were killed in the attack, a graphic ending to the fourth week of the death penalty trial that is expected to run through the summer.

Colorado Theater Shooting Jurors See Graphic Autopsy Photos

May 22, 2015 11:01 am | by The Associated Press | Comments

Jurors in the Colorado theater shooting case on Thursday viewed autopsy photos of some of the 12 people who were killed in the attack, a graphic ending to the fourth week of the death penalty trial that is expected to run through the summer.  

TOPICS:
Digital forensics isn't only about fancy tools and technologies that aid investigators in their work. It's as much about ingenuity and creativity as technology, and requires a unique array of skill: the technical savvy of a science- club geek married with

Computer Forensic Investigations Require Planning and Investment

May 22, 2015 10:40 am | by Daintry Duffy, CSO | Comments

Digital forensics isn't only about fancy tools and technologies that aid investigators in their work. It's as much about ingenuity and creativity as technology, and requires a unique array of skill: the technical savvy of a science- club geek married with the curiosity that marks a seasoned detective.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading