Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

Marijuana Edibles Blamed for Colorado Death

March 26, 2015 | by Brian Maass, CBS Denver | Comments

The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

Researchers Leaving Their Own Marks on Crime Solving

March 27, 2015 2:13 pm | by The Independent | Comments

University researchers have developed a new way of identifying substances in fingermarks left at crime scenes, which has the potential to be a key weapon for detectives attempting to bring criminals to justice.

TOPICS:
In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

Police Sort Crash Victims' Remains

March 27, 2015 1:36 pm | by Mark Deen, Bloomberg | Comments

In a ravine in the French Alps strewn with thousands of pieces of the crashed Germanwings plane, police painstakingly search for body parts, airlifting them to a base for their identification.

TOPICS:
The United States is losing an information war to Russia, Islamic State and other rivals, says a new report that calls for a strengthening in U.S. counter-propaganda efforts and an overhaul of the government's international broadcasting arm.

US Losing 'Information War' to Russia, Others

March 27, 2015 12:00 pm | by Warren Strobel, Reuters | Comments

The United States is losing an information war to Russia, Islamic State and other rivals, says a new report that calls for a strengthening in U.S. counter-propaganda efforts and an overhaul of the government's international broadcasting arm.

TOPICS:
Advertisement
The military has had its hands full combating ISIS on the battlefield in both Iraq and Syria, attempting to use air power to push the group back from territorial gains. Aside from the difficulties of engaging in another gritty urban combat environment, wi

ISIS Proves Savvy in Social Media, Cyber Domain

March 27, 2015 11:52 am | by Mark Pomerleau, Defense Systems | Comments

The military has had its hands full combating ISIS on the battlefield in both Iraq and Syria, attempting to use air power to push the group back from territorial gains. Aside from the difficulties of engaging in another gritty urban combat environment, with the help of 60 nations participating in the U.S.-led coalition, ISIS has also proven themselves adept in the cyber realm – a scary prospect.

TOPICS:
The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked

One in Every 3 Top Websites is Compromised and Dangerous

March 27, 2015 11:13 am | by Tara Seals, Infosecurity Magazine | Comments

The Web is a more dangerous place than most people may think. With more than one billion websites now living on the lnternet and over 100,000 websites created daily, the risk from vulnerable sites is multiplying. In fact, one-third of the most-trafficked websites are risky, new research has revealed.

TOPICS:
Autopsies are scheduled on the bodies of two children found in a deep freezer in their Detroit home.

Autopsies Scheduled for Detroit Children Found in Freezer

March 27, 2015 10:45 am | Comments

Autopsies are scheduled on the bodies of two children found in a deep freezer in their Detroit home.

TOPICS:
U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institu

US Rules Make Chances of Cockpit Takeover Slim Says Expert

March 27, 2015 8:52 am | by Rodrique Ngowi, Associated Press | Comments

U.S. flight regulations make it unlikely that a single jetliner pilot could barricade himself or herself inside the cockpit like French prosecutors say the Germanwings co-pilot did before crashing his airliner into the French Alps, a Massachusetts Institute of Technology aviation analyst says.

TOPICS:
A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-p

Getting a Critical Edge on Plutonium Identification

March 27, 2015 8:27 am | by NIST | Comments

A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.

TOPICS:
Advertisement
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create

Mathematicians Redesign Encrytion Code to Thwart Cyber Attacks

March 27, 2015 8:27 am | by Rebecca Phillips, Washington State University | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

TOPICS:
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

Inside the Ottawa Police Forensics Lab

March 26, 2015 1:13 pm | by Judy Trinh, CBC News | Comments

They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

TOPICS:
After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them.

Macro-Based Malware Continues to Gain Traction

March 26, 2015 12:30 pm | by Zeljka Zorn, Help Net Security | Comments

After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them. 

TOPICS:
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

BitWhisper Puts the Heat on Air-Gapped Computers

March 26, 2015 10:42 am | by Ben-Gurion University of the Negev | Comments

Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

TOPICS:
Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

Android Apps Vulnerable to Hijacking

March 26, 2015 10:22 am | by Ernie Austin, Associate Editor | Comments

Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

TOPICS:
out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organiz

ISACA Lays Out Forensics for the Data Breach Era

March 25, 2015 12:27 pm | by Tara Seals, Infosecurity Magazine | Comments

When faced with a data breach, the first order of business for companies is to find out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations to consider when dealing with attacks.

TOPICS:
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

US to Stop Collecting Bulk Phone Data if Congress Lets Law Expire

March 25, 2015 12:14 pm | by Mark Hosenball, Reuters | Comments

U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading