Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this cl

Fingerprint Accuracy Stays the Same Over Time

June 30, 2015 2:36 pm | by Michigan State University | Comments

Fingerprints have been used by law enforcement and forensics experts to successfully identify people for more than 100 years. Though fingerprints are assumed to be infallible personal identifiers, there has been little scientific research to prove this claim to be true. As such, there have been repeated challenges to the admissibility of fingerprint evidence in courts of law.

TOPICS:
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms.

OPM Takes Vulnerable Background Investigation Portal Offline

June 30, 2015 12:03 pm | by Zeljka Zorz, Help Net Security | Comments

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a web-based platform used to complete and submit background investigation forms. 

TOPICS:
The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their d

MIT's Bitcoin-Inspired 'Enigma' Lets Computers Mine Encrypted Data

June 30, 2015 11:41 am | by Andy Greenberg, Wired | Comments

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can’t be counterfeited. Now a similar mix of math and code promises to pull off another seemingly magical feat by allowing anyone to share their data with the cloud and nonetheless keep it entirely private.

TOPICS:
Advertisement
Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and

Gas Stations in the Bullseye

June 30, 2015 11:12 am | by Kelly Jackson Higgins, Dark Reading | Comments

Researchers who earlier this year spotted potential hacktivist activity against popular gas tank monitoring systems at US gas stations say they've been studying some real-world attacks on these systems as well as on their own honeypot set up to study and gather intelligence on the attackers and their intentions.

TOPICS:
A cyber strategy announced last week by the head of the agency that hackers robbed of sensitive dossiers on federal employees has potential to deter future attacks, say private investigators who probe computer espionage campaigns.

After Historic Hack, OPM Chief’s 15-Point Plan May be Too Little, Too Late

June 30, 2015 10:45 am | by Aliya Sternstein, Nextgov | Comments

A cyber strategy announced last week by the head of the agency that hackers robbed of sensitive dossiers on federal employees has potential to deter future attacks, say private investigators who probe computer espionage campaigns. 

TOPICS:
Looking to bolster how it handles off-the-field incidents, the NFL is adding a new position: Director of Digital Forensic Investigations.

NFL Hiring a New Director of Digital Forensic Investigations

June 30, 2015 9:55 am | by Darren Rovell, ESPN | Comments

Looking to bolster how it handles off-the-field incidents, the NFL is adding a new position: Director of Digital Forensic Investigations.

TOPICS:
Montana autopsies will have to be done in other states in the coming weeks because the state's only two forensic medical examiners qualified to assist county coroners are leaving.

Montana to Outsource Autopsies After Forensic ME's Leave

June 29, 2015 2:51 pm | by The Associated Press | Comments

Montana autopsies will have to be done in other states in the coming weeks because the state's only two forensic medical examiners qualified to assist county coroners are leaving.

TOPICS:
China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy.

Out of the Shadows, China Hackers Turn Cyber Gatekeepers

June 29, 2015 12:27 pm | by Paul Carsten and Gerry Shih, Reuters | Comments

China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn't mean every Chinese hacker is out to pilfer and destroy.

TOPICS:
Advertisement
Following two cyber attacks on Penn State University’s College of Liberal Arts, the   university is resetting passwords on its college-issued accounts, but school   officials said they believe no personal identifiable information, such as Social   Securit

Penn State Says It Was Victim of Cyber Attack

June 29, 2015 12:06 pm | by Madasyn Czebiniak, Pittsburgh Post-Gazette | Comments

Following two cyber attacks on Penn State University’s College of Liberal Arts, the university is resetting passwords on its college-issued accounts, but school officials said they believe no personal identifiable information, such as Social Security numbers, or research data has been compromised.

TOPICS:
Recently discovered malware which uses digital steganography to hide itself in .PNG files has been overwhelmingly targeted at US healthcare providers, according to Trend Micro.

Stealthy Stegoloader Trojan in US Healthcare Blitz

June 29, 2015 11:45 am | by Phil Muncaster, Infosecurity Magazine | Comments

Recently discovered malware which uses digital steganography to hide itself in .PNG files has been overwhelmingly targeted at US healthcare providers, according to Trend Micro.

TOPICS:
A newly released document from the FBI sheds a little more light on the government’s controversial policy around the use of zero-day exploits. Though there is still much we don’t know, the question of when the secretive policy was put into place is finall

US Had Zero-Day Policy Since Early 2010

June 29, 2015 11:32 am | by Kim Zetter, Wired | Comments

A newly released document from the FBI sheds a little more light on the government’s controversial policy around the use of zero-day exploits. Though there is still much we don’t know, the question of when the secretive policy was put into place is finally answered: February, 2010.

TOPICS:
People found guilty of crimes in Wisconsin must pay to have their DNA collected — but ambiguous wording in the law may mean they're not all paying the same amount.

State Requires DNA Tests, but Who Pays What?

June 29, 2015 11:05 am | by Sari Leski, Stevens Point Journal | Comments

People found guilty of crimes in Wisconsin must pay to have their DNA collected — but ambiguous wording in the law may mean they're not all paying the same amount.

TOPICS:
A Pace, Florida man is in jail after deputies discovered his mother's months-old remains on his living room couch, according to a Sheriff's Office arrest report.

Man Lives Months With Mom's Corpse on Couch

June 29, 2015 10:26 am | by Kevin Robinson, Pensacola News Journal | Comments

A Pace, Florida man is in jail after deputies discovered his mother's months-old remains on his living room couch, according to a Sheriff's Office arrest report.

TOPICS:
A team of aviation investigators has been working in a remote, mountainous site in southeast Alaska to determine what caused the crash of a sightseeing plane that killed eight cruise ship passengers and the aircraft's pilot.

Investigators at Alaska Site of Plane Crash That Killed 9

June 29, 2015 10:04 am | by Becky Bohrer and Gosia Wozniacka, Associated Press | Comments

A team of aviation investigators has been working in a remote, mountainous site in southeast Alaska to determine what caused the crash of a sightseeing plane that killed eight cruise ship passengers and the aircraft's pilot.

TOPICS:
In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other t

NIST Revises Key Computer Security Publication on Random Number Generation

June 29, 2015 8:14 am | by NIST | Comments

In response to public concerns about cryptographic security, the National Institute of Standards and Technology has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other types of electronic data.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading