Social media giants including Twitter, Yahoo, Facebook and Google are pushing back against Senate legislation that would require them to alert federal authorities of any terrorist activity, according to industry and government officials.
Savannah State University has been approved for three grants worth $1,041,153 that will include...
The Obama administration has decided that the National Security Agency will soon stop examining...
Connecticut authorities say severed legs found in New Haven this month were from a homeless man...
About two weeks into last year's conflict in Gaza, Palestinian photographer Jehad Saftawi began to tire of venturing into the city every day to take images of the wreckage. He decided instead to set up a video camera showing the Gaza skyline in his apartment. A year on, Amnesty International says evidence collected by Saftawi and others shows that Israeli forces carried out war crimes in retaliation for the capture of an Israeli soldier.
The military on Monday exhumed more caskets containing the unidentified remains of USS Oklahoma crew members killed in the 1941 bombing of Pearl Harbor. A lab in Hawaii will identify some remains using dental records. The remains will then be sent to another lab in Omaha for DNA analysis.
In its three years in operation, the Iowa Division of Criminal Investigation’s Cold Case Unit brought to close two unsolved homicide cases dating as far back as the 1970s. The unit was shut down in 2011 after the federal grant that funded it ran out. But DCI officials said they continue to investigate homicides cases that have gone years, or even decades, without justice.
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
One of the most dangerous vulnerabilities to hit the Android scene ever has been uncovered: Dubbed Stagefright, the flaw makes all Android devices targets of remote take-over by simply receiving an MMS message, without even having to open or view it.
An attack in early 2014 on Anthem, the No. 2 US health insurer, was by most measuring sticks a historic hack, leading to the biggest healthcare data breach ever. New evidence unearthed by researchers from security firm Symantec, however, shows it was business as usual for the hacking group, which over the past three years has carried out more than a dozen similar attacks.
Maybe we should take the warnings of RoboCop more seriously. Famous scientists, engineers and businessmen are banding together to call for a ban on autonomous weapons development.
Planned Parenthood called on the FBI and the U.S. Department of Justice on Monday for help managing cybersecurity, following a report that the reproductive healthcare group's website had been hacked by anti-abortion activists.
Researchers have devised a new method for stealing data that bypasses typical security protections for sensitive data — using the GSM network, electromagnetic waves and a basic low-end mobile phone.
Sometime after 11:15 a.m. Monday, surveillance video shows a passenger in a white van grabbing the bag.
According to new research developed in part by scientists at the Missoula Fire Sciences Laboratory, we’ve been dazzled by the flames in the treetops when we really should be concentrating on forces near the ground.
Law enforcement officials routinely wait more than a year for forensic results to arrive from the state lab.
Until very recently, senior executives have been happy to pass the buck for cyber breaches to the IT department or claim that a significant cyber breach had been unforeseeable. But a series of high-profile resignations are now shining the spotlight squarely on senior board members.
The science of cell tower triangulation and GPS positioning were the weak links that didn’t meet the burden of proof in the murder case against a woman accused of fatally shooting her husband's ex-wife.
A group of researchers has described an anonymizing network called HORNET (High-speed Onion Routing at the NETwork layer), an onion-routing network that could become the next generation of Tor.