Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Coffee giant Starbucks has hit back at news reports claiming its mobile app was recently hacked, arguing that poor password management on the part of individual customers has led to their credit cards details being breached.

Starbucks Blames Customer Password Fail for Security Incident

May 15, 2015 10:47 am | by Phil Muncaster, Infosecurity Magazine | Comments

Coffee giant Starbucks has hit back at news reports claiming its mobile app was recently hacked, arguing that poor password management on the part of individual customers has led to their credit cards details being breached.

TOPICS:
Quantum mechanics is now being used to construct a new generation of computers that can solve the most complex scientific problems — and unlock every digital vault in the world. These will perform in seconds computations that would have taken conventional

Quantum Computing Will Make Encryption Obsolete

May 14, 2015 4:02 pm | by Vivek Wadhwa, The Washington Post | Comments

Quantum mechanics is now being used to construct a new generation of computers that can solve the most complex scientific problems — and unlock every digital vault in the world. These will perform in seconds computations that would have taken conventional computers millions of years. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.

TOPICS:
Experts at the University of Warwick in the UK have helped West Midlands Police to convict a man who killed his friend before disposing of the body in a canal. Had it not been for 3D technology, the conviction at Birmingham Crown Court might never have be

3D Printed Bones Help Solve Murder Case

May 14, 2015 2:48 pm | by Chris Parr, Times Higher Education | Comments

Experts at the University of Warwick in the UK have helped West Midlands Police to convict a man who killed his friend before disposing of the body in a canal. Had it not been for 3D technology, the conviction at Birmingham Crown Court might never have been secured.

TOPICS:
Advertisement
Lviv is a city where bones, not unlike the wartime history that left them here, cannot seem to stay buried. In places, residents can hardly till their gardens without risking turning up a grinning, toothy surprise.

In Ukraine, Bones of War Dead Re-emerge

May 14, 2015 2:30 pm | by Andrew Kramer, The New York Times | Comments

Lviv is a city where bones, not unlike the wartime history that left them here, cannot seem to stay buried. In places, residents can hardly till their gardens without risking turning up a grinning, toothy surprise.

TOPICS:
Kirk Odom was convicted of a 1981 rape and robbery after a woman identified him as her attacker and an FBI specialist testified that hair on her nightgown was similar to hair on Odom's head. But DNA testing some 30 years later affirmed what Odom long had

FBI Hair Analysis Problems Reveal Limits of Forensic Science

May 14, 2015 1:10 pm | by Eric Tucker, Associated Press | Comments

Kirk Odom was convicted of a 1981 rape and robbery after a woman identified him as her attacker and an FBI specialist testified that hair on her nightgown was similar to hair on Odom's head. But DNA testing some 30 years later affirmed what Odom long had maintained: The hair wasn't his.

TOPICS:
APTs are designed to gain access to a network, acquire data, and secretly monitor the   targeted computer systems over long periods. Many researchers agree that the term   “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by

Anatomy of an APT Attack: Step by Step Approach

May 14, 2015 12:38 pm | by Ashiq JA, Infosec Institute | Comments

APTs are designed to gain access to a network, acquire data, and secretly monitor the targeted computer systems over long periods. Many researchers agree that the term “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by security analysts to describe complex cyber attacks against specific targets for financial or informational gains by a well-funded group of individuals.  

TOPICS:
Despite the importance of tool mark analysis in the forensic sciences, the imaging and comparison of tool marks remains a difficult and time-consuming endeavor. The ability to certify two cases as highly similar is therefore a function of both the ability

3D Software Eliminates False Positives in Cartridge Case Comparisons

May 14, 2015 11:26 am | by Ryan Lilien, NIJ | Comments

Despite the importance of tool mark analysis in the forensic sciences, the imaging and comparison of tool marks remains a difficult and time-consuming endeavor. The ability to certify two cases as highly similar is therefore a function of both the ability to capture a high-resolution measurement of each case and the ability to identify and match relevant structural features. 

TOPICS:
A Russian hacking group was poised to launch a cyber assault on U.S. banks, but may have withdrawn those plans after being discovered.

Russian Hacking Group was Set to Hit US Banks

May 14, 2015 10:37 am | by Cory Bennett, The Hill | Comments

A Russian hacking group was poised to launch a cyber assault on U.S. banks, but may have withdrawn those plans after being discovered.

TOPICS:
Advertisement
The Sally Beauty chain confirmed Thursday that it has suffered its second data breach in just over two years. The beauty products seller had notified customers earlier this month that it was investigating reports of unusual activity on payment cards used

Sally Beauty Confirms Second Data Breach

May 14, 2015 10:18 am | by The Associated Press | Comments

The Sally Beauty chain confirmed Thursday that it has suffered its second data breach in just over two years. The beauty products seller had notified customers earlier this month that it was investigating reports of unusual activity on payment cards used at some of its U.S. locations.

TOPICS:
Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

New Domains Revitalize Phishing Campaigns

May 14, 2015 9:56 am | by Charlie Osborne, ZDNet | Comments

Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

TOPICS:
Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University

New KBI Crime Lab Called Needed Investment in Public Safety

May 13, 2015 2:35 pm | by Melissa Brunner, WIBW.com | Comments

Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University campus is long overdue.

TOPICS:
The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is vol

One of NJ's Largest Medical Examiner Offices Failed Accreditation, But Does It Matter?

May 13, 2015 2:18 pm | by Justin Zaremba, NJ.com | Comments

The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is voluntary, and most medical examiner offices throughout the country operate without accreditation.

TOPICS:
Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in

Romania Helps Ukraine Fight Russian Hacking

May 13, 2015 1:44 pm | by Alizon Mutler, Associated Press | Comments

Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in the fight against hacking.

TOPICS:
Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

VENOM Zero-Day May Affect Thousands Of Cloud, Virtualization Products

May 13, 2015 1:30 pm | by Sara Peters, Dark Reading | Comments

Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

TOPICS:
Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables crimina

Why So Much Cime is Cyber-Enabled

May 13, 2015 1:14 pm | by Mathew J. Schwartz, Gov Info Security | Comments

Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables criminals to hire specialists with skills or acquire attack tools on an as-needed basis.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading