Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A recently disclosed cyberattack at the University of Virginia in Charlottesville has become another example of the growing trend by attackers to exfiltrate sensitive data by targeting specific individuals within organizations.

University of Virginia Breach Targeted Two Individuals With China Links

August 24, 2015 10:05 am | by Jai Vijayan, Dark Reading | Comments

A recently disclosed cyber attack at the University of Virginia in Charlottesville has become another example of the growing trend by attackers to exfiltrate sensitive data by targeting specific individuals within organizations.

TOPICS:
Nearly two years after an Ardmore woman was shot to death, only one-third of the physical evidence that Winston-Salem police seized in their investigation has been sent to the North Carolina State Crime Lab, according to a letter from an attorney represen

Crime Lab Backlog Continues to Delay Death Penalty Case

August 21, 2015 12:17 pm | by Michael Hewlett, Winston-Salem Journal | Comments

Nearly two years after an Ardmore woman was shot to death, only one-third of the physical evidence that Winston-Salem police seized in their investigation has been sent to the North Carolina State Crime Lab, according to a letter from an attorney representing one of the defendants.

TOPICS:
At some point on Monday, the hacker group Impact Team made good on a promise to release   personally identifiable data of some 38 million users of AshleyMadison.com, a site that   bills itself as a matchmaker for the adulterous. Among the more predictable

The Ashley Madison Hack is Not OPM (But the Government May be Watching It Anyway)

August 21, 2015 11:09 am | by Patrick Tucker, Defense One | Comments

At some point on Monday, the hacker group Impact Team made good on a promise to release personally identifiable data of some 38 million users of AshleyMadison.com, a site that bills itself as a matchmaker for the adulterous. Among the more predictable revelations: most of the registered accounts — 28 million — belong to men. And thousands of the accounts appeared, at least upon initial inspection, to belong to military service members.

TOPICS:
Advertisement
The National Security Agency is advising U.S. agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by

NSA Preps Quantum-Resistant Algorithms to Head Off Crypto-Apocalypse

August 21, 2015 10:18 am | by Dan Goodin, Ars Technica | Comments

The National Security Agency is advising U.S. agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing.

TOPICS:
The Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services is launched with the help of the financial services industry.

Law Firms Form Their Own Threat Intel-Sharing Group

August 21, 2015 10:11 am | by Kelly Jackson Higgins, Dark Reading | Comments

The Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services is launched with the help of the financial services industry.

TOPICS:
Forensic entomology is subject to many environmental factors (temperature being one of the principle variables), and it requires both access to the bodies and extensive information on the local insect population. The author set out to use a molecular appr

A Molecular Approach to Estimating Postmortem Interval

August 21, 2015 8:23 am | by Clifton P. Bishop, NIJ | Comments

Forensic entomology is subject to many environmental factors (temperature being one of the principle variables), and it requires both access to the bodies and extensive information on the local insect population. The author set out to use a molecular approach similar to one previously used to estimate the age of a bloodstain in an approach that is analogous to Carbon-14 dating, relying upon RNA segments.

TOPICS:
A second suspect has been charged in connection with the death of a Pittsburgh man later found in a West Virginia river, and with killing the victim's dog so its blood could be used to contaminate the crime scene.

Dog Blood Used to Contaminate Homicide Crime Scene, Suspect Says

August 20, 2015 3:04 pm | by The Associated Press | Comments

A second suspect has been charged in connection with the death of a Pittsburgh man later found in a West Virginia river, and with killing the victim's dog so its blood could be used to contaminate the crime scene.

TOPICS:
Kim Murga, Las Vegas Metro's forensic laboratory director, said untested rape kits go back to 1983, before DNA testing became more common about 15 years ago. Nevada is no different from most of the nation, which is struggling to confront rape kit backlogs

Funding for DNA Testing Key to Cracking Cold Criminal Cases

August 20, 2015 11:34 am | by Wesley Juhl, Las Vegas Review-Journal | Comments

Kim Murga, Las Vegas Metro's forensic laboratory director, said untested rape kits go back to 1983, before DNA testing became more common about 15 years ago. Nevada is no different from most of the nation, which is struggling to confront rape kit backlogs and the high costs associated with catching up, she said.

TOPICS:
Advertisement
A unique glove and a DNA match helped lead to a conviction in the 1999 slaying of an 84-year-old woman whose body was found in an alley behind a church on Detroit's west side, authorities said.

Glove, DNA Match Help Lead to Conviction in 1999 Slaying

August 20, 2015 11:23 am | by The Associated Press | Comments

A unique glove and a DNA match helped lead to a conviction in the 1999 slaying of an 84-year-old woman whose body was found in an alley behind a church on Detroit's west side, authorities said.

TOPICS:
Like so many subpar technothrillers, the saga of Clinton’s email server has dragged on   well beyond the point of exhaustion. The latest chapter, though, in which the FBI combs   through the hardware that once hosted tens of thousands of Clinton’s digital

The FBI Has Clinton's Email Server. Now What?

August 20, 2015 10:52 am | by Brian Barrett, Wired | Comments

Like so many subpar technothrillers, the saga of Clinton’s email server has dragged on well beyond the point of exhaustion. The latest chapter, though, in which the FBI combs through the hardware that once hosted tens of thousands of Clinton’s digital epistles, raises the question of just how hard it is to vanish your data — or for someone else to retrieve it after you do.

TOPICS:
Republican presidential hopeful Jeb Bush said Tuesday that the government should have broad surveillance powers of Americans and private technology firms should cooperate better with intelligence agencies to help combat "evildoers."

Jeb Bush Wants to Fight 'Evil' Encryption

August 20, 2015 10:27 am | by Bill Barrow, Associated Press | Comments

Republican presidential hopeful Jeb Bush said Tuesday that the government should have broad surveillance powers of Americans and private technology firms should cooperate better with intelligence agencies to help combat "evildoers."

TOPICS:
Breach highlights need for greater anonymity controls in identity and payment mechanisms.

ID Thieves, Blackmailers Have Lots to Gain in Ashley Madison Breach

August 20, 2015 10:14 am | by Sara Peters, Dark Reading | Comments

Breach highlights need for greater anonymity controls in identity and payment mechanisms.

TOPICS:
Faced with a looming tech talent shortage, the technology industry has often worked with academia to engage tomorrow’s professionals, ensure students are learning essential skills and cultivate talent to address emerging cyber threats. In that vein, Guida

Caltech Kicks Off Anomaly-Based Data Security Research Program

August 20, 2015 9:51 am | by Tara Seals, Infosecurity Magazine | Comments

Faced with a looming tech talent shortage, the technology industry has often worked with academia to engage tomorrow’s professionals, ensure students are learning essential skills and cultivate talent to address emerging cyber threats. In that vein, Guidance Software has funded a program at the California Institute of Technology (Caltech) to support data security research using advanced anomaly science.

TOPICS:
The abundance of password leaks over the past decade has revealed some of the most commonly used — and consequently most vulnerable — passphrases, including "password", "p@$$w0rd", and "1234567". The large body of data has proven invaluable to whitehats a

New Data Uncovers the Surprising Predictability of Android Lock Patterns

August 20, 2015 9:40 am | by Dan Goodin, Ars Technica | Comments

The abundance of password leaks over the past decade has revealed some of the most commonly used — and consequently most vulnerable — passphrases, including "password", "p@$$w0rd", and "1234567". The large body of data has proven invaluable to whitehats and blackhats alike in identifying passwords that on their face may appear strong but can be cracked in a matter of seconds.

TOPICS:
A police manhunt was underway Wednesday for an "unidentified foreign man" shown in a security video leaving a backpack at a popular Bangkok shrine just minutes before a bomb exploded there.

Police Hunt 'Foreigner' in Deadly Bombing of Bangkok Shrine

August 19, 2015 2:14 pm | by Jocelyn Gecker and Nattasuda Anusonadisai, Associated Press | Comments

A police manhunt was underway Wednesday for an "unidentified foreign man" shown in a security video leaving a backpack at a popular Bangkok shrine just minutes before a bomb exploded there.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading