Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

DNA Evidence Exonerates Canadian Tourist Murder Suspect

May 19, 2015 1:32 pm | by Carey Codd, CBS4 | Comments

Dobard said he knew nothing of the crime and nothing of the victim, Domenico Perruccio. But he turned himself in to Hollywood Police fearing for his safety and hoping to clear his name.

TOPICS:

Cocaine Users Sweat Over Fingerprint Analysis

May 19, 2015 1:22 pm | by Simon Neil, Chemistry World | Comments

Have you recently taken an illicit drug? You have the right to remain silent, but if authorities really need an answer, there’s a global testing industry worth several billion dollars on hand to help, with an array of analytical techniques.

TOPICS:
The Army is seeking the assistance of cyberattack tool sellers, joining a growing number of Pentagon entities aiming to amass advanced cyber capabilities.

Army is in Talks With 'Cyber Effects' Vendors

May 19, 2015 12:27 pm | by Aliya Sternstein, Nextgov | Comments

The Army is seeking the assistance of cyberattack tool sellers, joining a growing number of Pentagon entities aiming to amass advanced cyber capabilities. 

TOPICS:
Advertisement
Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems more than a dozen times in recent years, allowing him - in at least one case - to access a plane's thrust management computer and cause it to

Questions Over Plane Hacking Report

May 19, 2015 11:11 am | by Mathew J. Schwartz, Gov Info Security | Comments

Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems more than a dozen times in recent years, allowing him - in at least one case - to access a plane's thrust management computer and cause it to climb?

TOPICS:
New research data shows that the rate of new malware variants released by malicious attackers continues to break records.

Every 4 Seconds New Malware is Born

May 19, 2015 10:49 am | by Ericka Chickowski, Dark Reading | Comments

New research data shows that the rate of new malware variants released by malicious attackers continues to break records.

TOPICS:
The U.S. House has voted to strike the section of the Patriot Act that allows mass   collection of Americans’ phone metadata, a week after the federal appeals court   ruling that the dragnet wasn’t legal anyway. Amid the progress, Germans are still   proc

Germans Still Mulling Over Complicity with NSA

May 18, 2015 12:51 pm | by Grace Dobush, Quartz | Comments

The U.S. House has voted to strike the section of the Patriot Act that allows mass collection of Americans’ phone metadata, a week after the federal appeals court ruling that the dragnet wasn’t legal anyway. Amid the progress, Germans are still processing what exactly the National Security Agency has been up to on the continent.

TOPICS:

Police: 9 Dead in Texas Shooting All Members of Biker Gangs

May 18, 2015 12:10 pm | by Nomaan Merchant, AP | Comments

The violence erupted shortly after noon at a busy Waco shopping center along Interstate 35 that draws a large lunchtime crowd. Waco police Sgt. W. Patrick Swanton said eight people died at the scene of the shooting at Twin Peaks restaurant and another person died at a hospital.

TOPICS:
Bot traffic has surpassed human traffic this year, now accounting for 59 percent of all site visits, according to a report released by Distil Networks.

Bots Now Outnumber Humans on the Web

May 18, 2015 11:55 am | by Maria Korolov, CSO | Comments

Bot traffic has surpassed human traffic this year, now accounting for 59 percent of all site visits, according to a report released by Distil Networks.

TOPICS:
Advertisement
The British GCHQ staff, intelligence officers and police have been given immunity from prosecution for hacking into computers, laptops and mobile phones under legislative changes that were never fully debated by parliament, a tribunal has been told.

British Spies Can Hack Digital Devices Legally

May 18, 2015 10:21 am | by Owen Bowcott, the Guardian | Comments

The British GCHQ staff, intelligence officers and police have been given immunity from prosecution for hacking into computers, laptops and mobile phones under legislative changes that were never fully debated by parliament, a tribunal has been told.

TOPICS:
Islamic terrorists are stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.

ISIS Preps for Cyber War

May 18, 2015 10:08 am | by Cory Bennett and Elise Viebeck, The Hill | Comments

Islamic terrorists are stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.

TOPICS:
The Penn State College of Engineering has been the target of two sophisticated cyber attacks conducted by so-called “advanced persistent threat” actors, University officials have said. The FireEye cybersecurity forensic unit Mandiant, which was hired by P

Penn State Network Disabled in Response to Sophisticated Cyber Attack

May 18, 2015 9:38 am | by Penn State University | Comments

The Penn State College of Engineering has been the target of two sophisticated cyber attacks conducted by so-called “advanced persistent threat” actors. The FireEye cybersecurity forensic unit Mandiant, which was hired by Penn State after the breach was discovered, has confirmed that at least one of the two attacks was carried out by a threat actor based in China, using advanced malware to attack systems in the college.

TOPICS:
Following revelations the Federal Bureau of Investigation sent innocent people to prison using flawed hair forensics, Massachusetts is launching its own review of cases to see if state crime lab technicians made similar errors.

Massachusetts Launching Review of Convictions to Find Faulty Hair Forensics

May 15, 2015 2:27 pm | by Karen Anderson, WCBV5 | Comments

Following revelations the Federal Bureau of Investigation sent innocent people to prison using flawed hair forensics, Massachusetts is launching its own review of cases to see if state crime lab technicians made similar errors.

TOPICS:
Lisa Koziol-Ellis had at least 55 stab wounds to her body when her husband, Dashiell, found her on the floor of their Elgin home in the early morning hours of March 2, 2013, according to officials, as the trial of the accused killer continued.

Forensic Pathologist Testifies Cut Aorta Killed Woman Stabbed 55 Times

May 15, 2015 1:58 pm | by Janelle Walker, The Chicago Tribune | Comments

Lisa Koziol-Ellis had at least 55 stab wounds to her body when her husband, Dashiell, found her on the floor of their Elgin home in the early morning hours of March 2, 2013, according to officials, as the trial of the accused killer continued.

TOPICS:
A report on Iran’s possible plans to launch devastating cyber attacks in the United States raised eyebrows last month, both for its alarming claims and its unusual combination of authors. But, government and outside experts have wondered whether the preli

The Overhyping of Iran's Cyber Army

May 15, 2015 11:08 am | by Shane Harris, The Daily Beast | Comments

A report on Iran’s possible plans to launch devastating cyber attacks in the United States raised eyebrows last month, both for its alarming claims and its unusual combination of authors. But, government and outside experts have wondered whether the preliminary findings was relying on dubious intelligence to stir up fears about pending Iranian cyber attacks, just as U.S. officials were trying to iron out the nuclear deal.

TOPICS:
Coffee giant Starbucks has hit back at news reports claiming its mobile app was recently hacked, arguing that poor password management on the part of individual customers has led to their credit cards details being breached.

Starbucks Blames Customer Password Fail for Security Incident

May 15, 2015 10:47 am | by Phil Muncaster, Infosecurity Magazine | Comments

Coffee giant Starbucks has hit back at news reports claiming its mobile app was recently hacked, arguing that poor password management on the part of individual customers has led to their credit cards details being breached.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading