Advertisement
 
News
Subscribe to Forensic Magazine

The Lead

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidenc

Almost None of the Women in the Ashley Madison Database Ever Used the Site

August 27, 2015 | by Annalee Newitz, Gizmodo | Comments

When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were. 

TOPICS:
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus ne

Associated Press Sues After FBI Impersonates Journalist in Sting Operation

August 28, 2015 10:35 am | by Mary Ann Toman-Miller, Los Angeles Times | Comments

Accusing the Justice Department of stonewalling, media company Associated Press filed a suit Thursday against the FBI for failing to turn over information under the Freedom of Information Act about a criminal sting operation in which it created a bogus news story and impersonated an AP journalist.

TOPICS:
The murder suspect at the center of a national immigration debate admits he fired the shot that killed a young San Francisco woman on an evening stroll with her father. The question remains whether he purposely aimed the gun at Kate Steinle, 32, or accide

Fatal Shot in San Francisco Pier Shooting Was Ricochet, Expert Testifies

August 28, 2015 10:12 am | by Paul Elias, Associated Press | Comments

The murder suspect at the center of a national immigration debate admits he fired the shot that killed a young San Francisco woman on an evening stroll with her father. The question remains whether he purposely aimed the gun at Kate Steinle, 32, or accidentally fired the weapon.

TOPICS:
In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

Chemical Sampling Interface Features Simplicity, Speed

August 27, 2015 12:16 pm | by Oak Ridge National Laboratory | Comments

In mere seconds, a system developed at the Department of Energy’s Oak Ridge National Laboratory can identify and characterize a solid or liquid sample.

TOPICS:
Advertisement
The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.

The US Military Gets a Guidebook to the Cloud

August 27, 2015 10:07 am | by Frank Konkel, Defense One | Comments

The Defense Department’s information technology arm has unveiled a guide for IT shops in the defense and military space planning a move to the cloud.  

TOPICS:
The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

Agora, the Dark Web's Biggest Drug Market, is Going Offline

August 27, 2015 8:18 am | by Andy Greenberg, Wired | Comments

The Dark Web's biggest marketplace for drugs seems to have learned a lesson from the downfall of the Silk Road: When cracks start to appear in your anonymity’s armor, it’s time to quit while you’re ahead — or, at least, retreat and regroup.

TOPICS:
The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control syst

Draft Guide Can Help Energy Companies Reduce Cyber Risk

August 27, 2015 8:18 am | by NIST | Comments

The National Cybersecurity Center of Excellence is requesting comments on a draft guide to help energy companies better control who has access to their networked resources, including buildings, equipment, information technology and industrial control systems. The center, part of the U.S. Commerce Department’s National Institute of Standards and Technology, works with IT developers and providers to help businesses reduce their cyber risk.

TOPICS:
Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

How Katrina Turned a Psychiatrist Into a Coroner

August 26, 2015 2:14 pm | by Katie Bishop and Anna Sale, The Atlantic | Comments

Ten years ago, psychiatrist Jeffrey Rouse was on a clear path toward academia. He spent most of his days hunkered down in a research lab, staring at MRI images of brains. Then Hurricane Katrina upended his world.

TOPICS:
The popular code repository website GitHub was hit by a cyberattack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

GitHub Hit By DDoS Attack, Again

August 26, 2015 12:34 pm | by Lorenzo Franceschi-Bicchierai, Motherboard | Comments

The popular code repository website GitHub was hit by a cyber attack on Tuesday morning, just a few months after it suffered a massive and enduring distributed denial of service attack, which was linked to China.

TOPICS:
Advertisement
Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

Ashley Madison Users in US Sue Cheating Website Over Breach

August 26, 2015 11:43 am | by Amanda Lee Myers, Associated Press | Comments

Eight people across the U.S. who registered to use Ashley Madison are suing the website for cheaters after hackers released personal and detailed information of millions of users, including financial data and sexual proclivities.

TOPICS:
With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

IBM Advises Businesses to Block Tor

August 26, 2015 11:26 am | by Kelly Jackson Higgins, Dark Reading | Comments

With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise.

TOPICS:
Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

Symantec Publishes Crash Course in Car Security

August 26, 2015 11:14 am | by Mike Hine, Infosecurity Magazine | Comments

Security firm Symantec has released a research report containing advice and practical guidance for combatting the increasingly significant issue of automotive security vulnerabilities.

TOPICS:
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years

How Security Flaws Work: The Buffer Overflow

August 26, 2015 11:01 am | by Peter Bright, Ars Technica | Comments

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm — 1988's Morris Worm — used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems.

TOPICS:
Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsyc

Understanding Men Who Kill Intimate Partners

August 26, 2015 9:03 am | by Marla Paul, Northwestern University | Comments

Murderers who kill intimate partners and family members have a significantly different psychological and forensic profile from murderers who kill people they don’t know, reports a new study that examined the demographics, psychiatric history and neuropsychology of these individuals. 

TOPICS:
The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data neede

Development in Analyzing Pediatric Cranial Fracture Trauma

August 26, 2015 8:50 am | by Todd Fenton, NIJ | Comments

The purpose of this research was to provide medicolegal death investigation experts (such as forensic pathologists, coroners, forensic anthropologists, and medical examiner investigators), as well as child protective services professionals, the data needed to more accurately interpret pediatric cranial trauma and determine whether it is consistent with abusive or accidental injury.

TOPICS:
Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be u

Determining the Age of Fingerprints

August 25, 2015 3:16 pm | by NIST | Comments

Watch the imprint of a tire track in soft mud, and it will slowly blur, the ridges of the pattern gradually flowing into the valleys. Researchers at the National Institute of Standards and Technology have tested the theory that a similar effect could be used to give forensic scientists something they’ve long wished for: A way to date fingerprints.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading