Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

Two former federal agents have been charged with wire fraud, money laundering and   related offenses for stealing digital currency during their investigation of the   Silk Road, an underground black market that allowed users to conduct illegal   transacti

Federal Computer Forensics Expert Turns to the Dark Web

March 31, 2015 | by Ernie Austin, Associate Editor | Comments

Two former federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of the Silk Road, an underground black market that allowed users to conduct illegal transactions over the Internet, the Department of Justice has announced.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials bel

NSA Weighed Ending Phone Surveillance Program Before Leak

March 31, 2015 11:18 am | by Ken Dilanian, Associated Press | Comments

The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials believed the costs outweighed the meager counterterrorism benefits.

TOPICS:

Visual Artist Creates 3-D Portraits From Pieces of Chewed Gum

March 31, 2015 11:05 am | by Andy Roesgen, DNAinfo | Comments

You lose your wallet on a busy Michigan Avenue. Or you forget your phone in a crowded restaurant — and all your private information just sits there, waiting to be found. As gut-wrenching as it may feel, a Chicago "bio-artist" wonders if some day you might feel the same dread from your discarded coffee cup, or chewed-up piece of gum, or a single strand of hair left in public.

TOPICS:
A multi-staged, targeted campaign is striking the international energy sector in order to spy on companies and steal sensitive information.

Reconnaissance Malware Wave Strikes Energy Sector

March 31, 2015 10:47 am | by Charlie Osborne, ZD Net | Comments

A multi-staged, targeted campaign is striking the international energy sector in order to spy on companies and steal sensitive information.

TOPICS:
Advertisement

King Richard III's Facial Features Reconstructed

March 31, 2015 10:47 am | by Rhian Lubin, The Liverpool Echo | Comments

Originally the king was thought to have dark hair and black eyes, but the new tests reveal he most likely had mousey-brown hair and blue eyes.

TOPICS:

DNA Cracks 30-year-old Cold Case Murder

March 31, 2015 10:34 am | by Alex LeFriec, KXLY.com | Comments

The last time Jeffrey Vargos's family saw their son alive he was riding his bike in an Anaheim, California neighborhood in July of 1981. The next day his body was found at a construction site more than 20 miles away in Pomona. Vargos had been strangled to death.

TOPICS:
The recent large-scale DDoS attacks against GitHub and anti-censorship group Greatfire.org are likely to signal the start of a major new attack campaign by China against foreign internet sites, according to Greatfire.

Beijing May Target Foreign Websites in New DDoS Campaign

March 31, 2015 10:23 am | by Phil Muncaster, Infosecurity Magazine | Comments

The recent large-scale DDoS attacks against GitHub and anti-censorship group Greatfire.org are likely to signal the start of a major new attack campaign by China against foreign internet sites, according to Greatfire.

TOPICS:

Nanotech-Supercarbon, Graphene, Could Significantly Speed Up Sequencing

March 31, 2015 10:22 am | by Sean Allocca, Editor | Comments

Using a two-dimensional, hexagonal lattice of carbon atoms, called graphene, researchers say they have observed small structural changes to the material in a “measurably different way” that can be used to detect the four nucleobases, according to a report from the University of Melbourne. A unique combination of these nucleobases – adenine, cytosine, guanine and thymine – create the individual genetic DNA.

TOPICS:
Saudi hackers from Team Bad Dream have hacked and defaced the official website of  U.S. Army Picatinny Arsenal.

US Army Picatinny Arsenal Website Defaced by Saudi Hackers

March 30, 2015 1:34 pm | by Hack Read | Comments

Saudi hackers from Team Bad Dream have hacked and defaced the official website of  U.S. Army Picatinny Arsenal. 

TOPICS:
Advertisement
Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival Ch

Taiwan Wants Stronger Cyber Ties with US to Counter China Threat

March 30, 2015 1:17 pm | by Michael Gold and J.R. Wu, Reuters | Comments

Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move which would help safeguard against constant targeting by hackers in rival China.  

TOPICS:
On Friday, GitHub, the open-source software code collaboration site, said they were experiencing the largest DDoS (distributed denial of service) attack in github.com's history, according to their blogpost.

DDoS Attack Targets GitHub Anti-Censorship

March 30, 2015 12:31 pm | by Ernie Austin, Associate Editor | Comments

On Friday, GitHub, the open-source software code collaboration site, said they were experiencing the largest DDoS (distributed denial of service) attack in github.com's history, according to their blogpost.

TOPICS:

DNA Evidence Used to Prevent Costly Medical Errors

March 30, 2015 11:31 am | by Shari Rudavsky, Indianapolis Star | Comments

Indianapolis-based Strand Analytical Laboratories, which was started a decade ago to run DNA tests on crime scene evidence, now spends most of its time helping solve false positives on cancer biopsies.

TOPICS:
In the young, billion-dollar growth sector of threat intel, vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. That's because right now, organizations know they need to 'do' threat intelligence - yet

New Threat Intelligence Report Skewers Industry Confusion, Charlatans

March 30, 2015 11:27 am | by Violet Blue, ZD Net | Comments

In the young, billion-dollar growth sector of threat intel, vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products. That's because right now, organizations know they need to 'do' threat intelligence - yet few understand, or can agree on what that means.

TOPICS:

Germanwings Crash: Forensic Teams Identify 78 DNA Strands From Remains

March 30, 2015 11:10 am | by Luke Harding and Angelique Chrisafis, The Guardian | Comments

Rescuers are still, however, to locate the plane’s second black box — its flight data recorder — six days after the Barcelona to Düsseldorf flight crashed into a rocky ravine at 435 miles (700km) per hour.

TOPICS:
University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

Researchers Leaving Their Own Marks on Crime Solving

March 27, 2015 2:13 pm | by The Independent | Comments

University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

TOPICS:
In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

Police Sort Crash Victims' Remains

March 27, 2015 1:36 pm | by Mark Deen, Bloomberg | Comments

In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading