Montana autopsies will have to be done in other states in the coming weeks because the state's only two forensic medical examiners qualified to assist county coroners are leaving.
A newly released document from the FBI sheds a little more light on the government’s...
People found guilty of crimes in Wisconsin must pay to have their DNA collected — but ambiguous...
China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy.
Following two cyber attacks on Penn State University’s College of Liberal Arts, the university is resetting passwords on its college-issued accounts, but school officials said they believe no personal identifiable information, such as Social Security numbers, or research data has been compromised.
Recently discovered malware which uses digital steganography to hide itself in .PNG files has been overwhelmingly targeted at US healthcare providers, according to Trend Micro.
A team of aviation investigators has been working in a remote, mountainous site in southeast Alaska to determine what caused the crash of a sightseeing plane that killed eight cruise ship passengers and the aircraft's pilot.
In response to public concerns about cryptographic security, the National Institute of Standards and Technology has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other types of electronic data.
New York City has agreed to pay $6.25 million to a man who spent nearly 25 years in prison before being exonerated in a killing that happened while he was more than 1,000 miles away vacationing at Disney World, the city comptroller said.
Problems in the Connecticut state police crime lab delayed for at least four years the identification of a woman investigators think was killed by suspected serial killer William Devin Howell and hindered their ability to match several different samples of DNA found in Howell's van, The Courant has learned.
Cyber criminals have rapidly adapted their phishing campaigns over the past year, abandoning social media lures in favor of a new focus on business users with communication notification templates, according to reserchers.
European police agencies have announced a "joint international strike against cyber crime," reporting that after a two-year investigation, they have disrupted a botnet gang that used and sold banking malware and cybercrime services that targeted victims and banks around the world.
A conflict has erupted over the right to use and distribute products that contain strong encryption technology. This debate between government actors seeking ways to preserve access to encrypted communications and a coalition of pro-encryption groups is reminiscent of an old battle that played out in the 1990s: a period that has come to be known as the “Crypto Wars.”
Once a month, for the last 25 years, criminal investigators and forensics experts have been meeting for lunch behind closed doors in Philadelphia to discuss some of the nation's most heinous crimes. But what might appear a shadowy cabal to the casual viewer is actually a volunteer collection of crimefighters donating their time and expertise to help smaller police departments investigate unsolved crimes.
A man who spent almost 20 years in prison - including 12 on death row - for murders he did not commit will now help oversee the city of Houston's new crime lab.
A CIA-backed startup has discovered login credentials and passwords for 47 US government agencies littered across the Internet - leaving federal agencies potentially at risk of cyber attack.
Finger-pointing burst into the open on Capitol Hill Wednesday over blame for hacking into the U.S. government's personnel records, which the chairman of a House oversight committee said might affect as many as 32 million current and former employees and others.
Internet pioneer and DNS expert Paul Vixie says "passive DNS" is way to shut down malicious servers and infrastructure without affecting innocent users.