Like a corporation that doesn't like government intrusion, the Iranian government seems to to be turning from aggression within regulated industry to a new warfare technology that has fewer restrictions.
Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flourish: under the cover of the Dark Web’s anonymity protections.
The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and professor of digital forensics, the report contained much erroneous information.
Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.
Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domestic Nuclear Detection Office.
The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.
The Pentagon will miss its own 2016 deadline to create cybersecurity teams to defend critical computer networks from hacking and they won’t be fully operational until 2018, a senior Defense Department official said.
Seven years after the Federal Aviation Administration first warned Boeing that its new Dreamliner aircraft had a Wi-Fi design that made it vulnerable to hacking, a new government report suggests the passenger jets might still be vulnerable.
A new research institute has been awarded a significant grant from the Natural Environment Research Council to explore how techniques for documenting ancient footprints can help forensic scientists understand modern-day crime scenes.
Major sponsors of cyber warfare forces are reaching a state of deterrence resembling the mutually assured destruction in nuclear weapons standoffs, former U.S. national intelligence director Dennis Blair said recently.
Researchers have developed a statistical model that allows them to tell where a dust sample came from within the continental United States based on the DNA of fungi found in the sample. The primary goal of the research was to develop a new forensic biology tool for law enforcement or archeologists.
On Dec. 7, 1941, the USS Oklahoma was hit with numerous torpedoes and bombs during Japan’s fierce and shocking bombardment of Pearl Harbor, killing some 429 service members. The Pentagon has now decided to exhume unidentified remains held at the National Memorial Cemetery of the Pacific in Honolulu, Hawaii, do DNA testing, and return any identified remains to families that want them.
Collecting evidence, finding clues and investigating crimes can sound like a scene out of any Hollywood thriller. Pouring magnetic dust over a fingerprint detail in a forensic laboratory, Sarah Tariq Khoory is one of the few Emirati students learning forensic science at Amity University’s Dubai campus.
Kaspersky Lab has recorded a rare and unusual example of one cyber criminal attacking another. It believes that this could mark the emergence of a new trend in cybercriminal activity: the APT wars.
If you're looking to reduce the pool of possible zero-day vulnerabilities that could potentially be used for criminal or state-sponsored breaches of computer and network security, throwing people and money at the problem isn't necessarily going to solve it. At least, that's the conclusion from a team of researchers at MIT, Harvard, and the security firm HackerOne.