Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Lawsuit Over Naked Crime Scene Photos Headed for Trial

April 21, 2015 11:44 am | by Gregory Pratt, The Daily Southtown | Comments

The lawsuit, filed in late 2010 by Mejia's mother, Christina Mejia, and other relatives, alleges that responding sheriff's officers removed Mejia's clothes in violation of the department's own rules and took multiple nude photographs of her body. It alleges that the sheriff's office intentionally caused emotional distress to Mejia's family by shooting the photos.

TOPICS:
United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

Researcher Denied Airline Flight After Tweet About Hacking

April 21, 2015 10:24 am | by Jack Gillum, Associated Press | Comments

United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.

TOPICS:
At a time when the Pentagon arguably is losing a battle with industry for top tech talent, the Army is offering companies the resumes of its best cyber warriors.

The Army is Sharing Its Top Cyber Warriors With Hollywood and Wall Street

April 21, 2015 8:17 am | by Aliya Sternstein, Defense One | Comments

At a time when the Pentagon arguably is losing a battle with industry for top tech talent, the Army is offering companies the resumes of its best cyber warriors.

TOPICS:
Advertisement
Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.

Israeli Military Networks Breached by Hackers

April 20, 2015 1:45 pm | by Joseph Menn, Reuters | Comments

Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.

TOPICS:
Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.

Cyber Crime Now 'Number One' Threat: Europol Chief

April 20, 2015 1:20 pm | by AFP | Comments

Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.

TOPICS:
An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group resonsible

Two Vulnerabilities Exploited by Russian Hackers

April 20, 2015 1:02 pm | by Ernie Austin, Associate Editor | Comments

An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group responsible for the attack is APT28. 

TOPICS:

Milwaukee Group to Help Research Massacre of Jews in Poland

April 20, 2015 12:15 pm | by Annysa Johnson, The Journal Sentinel | Comments

A lesser known piece of that macabre history is the estimated 2 million or more who died, often slowly and agonizingly, one bullet at a time, at the hands of the Einsatzgruppen, the Ordnungspolizei and others.

TOPICS:

Standards Needed for Post-conviction Review of Scientific Evidence

April 20, 2015 12:07 pm | by John Collins | Comments

According to the Post, "Of 28 examiners with the FBI Laboratory’s microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far." It is noteworthy that no representatives of the Department of Justice, including the FBI, are quoted in the Post's article. 

TOPICS:
Advertisement

Crime-fighting Tool Helps NJ Police Solve Crimes

April 20, 2015 11:47 am | by Joe Cutler, New Jersey 101.5 | Comments

County and local police departments throughout New Jersey are employing technology to track shell casings from firearms in hopes of solving crimes.

TOPICS:
The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.

Algorithmic Cyber Attacks are Coming

April 20, 2015 8:39 am | by University of Utah | Comments

The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.  

TOPICS:
Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.

Colorado Law Enforcement Switches Message to Safe Pot Use

April 17, 2015 3:14 pm | by Kristen Wyatt, Associated Press | Comments

Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.

TOPICS:
The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to ju

Impact of Forensic Science Research & Development

April 17, 2015 2:35 pm | by NIJ | Comments

The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to justice and protect the innocent.

TOPICS:
The roles of the DNA analysts at the Greenville lab are not as glamorous as the fictional characters seen on television, but the analysts are instrumental in solving crimes in the Upstate ranging from burglaries to sexual assaults to homicides.

DNA Lab Lets the Science Talk in Criminal Cases

April 17, 2015 1:48 pm | by Romando Dixson, Greenville Online | Comments

The roles of the DNA analysts at the Greenville lab in South Carolina are not as glamorous as the fictional characters seen on television, but the analysts are instrumental in solving crimes in the Upstate ranging from burglaries to sexual assaults to homicides.

TOPICS:
IBM is making a move to open up more than two decades worth of cyber-threat intelligence via a new data-sharing exchange that is modeled off of social networking.

IBM Launches Open Threat Intelligence Platform

April 17, 2015 1:04 pm | by Tara Seals, Infosecurity Magazine | Comments

IBM is making a move to open up more than two decades worth of cyber-threat intelligence via a new data-sharing exchange that is modeled off of social networking.

TOPICS:
Cellebrite provided its Universal Forensic Extraction Device (UFED) units to the INTERPOL Digital Crime Centre (IDCC), to assist in retrieving evidence for the prosecution of suspects involved in a global online ‘sextortion’ scam.

Mobile Forensic Tool Accesses Key Evidence for Global 'Sextortion' Case

April 17, 2015 12:52 pm | by Cellebrite | Comments

Cellebrite provided its Universal Forensic Extraction Device (UFED) units to the INTERPOL Digital Crime Centre (IDCC), to assist in retrieving evidence for the prosecution of suspects involved in a global online ‘sextortion’ scam.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading