Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Like a corporation that doesn't like government intrusion, the Iranian government   seems to to be turning from aggression within regulated industry to a new warfare   technology that has fewer restrictions.

Iran Turning to Unregulated Cyber Attacks

April 17, 2015 12:30 pm | by Ernie Austin, Associate Editor | Comments

Like a corporation that doesn't like government intrusion, the Iranian government seems to to be turning from aggression within regulated industry to a new warfare technology that has fewer restrictions.

TOPICS:
Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flou

New Dark-Web Market is Selling Zero-Day Exploits to Hackers

April 17, 2015 12:04 pm | by Andy Greenberg, Wired | Comments

Hackers have for years bought and sold their secrets in a de facto gray market for zero-day exploits—intrusion techniques for which no software patch exists. Now a new marketplace hopes to formalize that digital arms trade in a setting where it could flourish: under the cover of the Dark Web’s anonymity protections.

TOPICS:
The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and

Pilot: US Government Claims Of Plane Wi-Fi Hacking Wrong And Irresponsible

April 17, 2015 8:46 am | by Thomas Fox-Brewster, Forbes | Comments

The US government released a report yesterday warning of security threats facing modern aircraft, leading to stories from major publications claiming in-flght Wi-Fi could be hacked to take control of a passenger plane. But according a qualified pilot and professor of digital forensics, the report contained much erroneous information.

TOPICS:
Advertisement
Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.

Isotopes Unlock Clues in Unidentified Human Remains

April 16, 2015 2:59 pm | by Arizona State university | Comments

Like something out of CSI or Bones, researchers at Arizona State University are working to solve the mysteries of unidentified human remains — and just as on those TV shows, science plays a key role.

TOPICS:
Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domes

Prairie View A&M Students Visit Texas A&M as Part of DHS Nuclear Forensics Program

April 16, 2015 2:40 pm | by Kelley Ragusa, Texas A&M University | Comments

Twenty nuclear forensics students and faculty from Prairie View A&M University visited the Texas A&M University campus as part of the Nuclear Forensics for Minority Serving Institutions program sponsored by the U.S. Department of Homeland Security’s Domestic Nuclear Detection Office.

TOPICS:
The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.

DEA, US Army Has Been Buying Hacking Tools

April 16, 2015 1:03 pm | by Cyrus Farivar, Ars Technica | Comments

The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA.

TOPICS:
The Pentagon will miss its own 2016 deadline to create cybersecurity teams to defend critical computer networks from hacking and they won’t be fully operational until 2018, a senior Defense Department official said.

US Military Anti-Hacking Force Won't be Ready Until 2018

April 16, 2015 12:07 pm | by Chris Strohm, Bloomberg | Comments

The Pentagon will miss its own 2016 deadline to create cybersecurity teams to defend critical computer networks from hacking and they won’t be fully operational until 2018, a senior Defense Department official said.

TOPICS:
Seven years after the Federal Aviation Administration first warned Boeing that its new Dreamliner aircraft had a Wi-Fi design that made it vulnerable to hacking, a new government report suggests the passenger jets might still be vulnerable.

Hackers Could Commandeer New Planes Through Passenger Wi-Fi

April 16, 2015 11:45 am | by Kim Zetter, Wired | Comments

Seven years after the Federal Aviation Administration first warned Boeing that its new Dreamliner aircraft had a Wi-Fi design that made it vulnerable to hacking, a new government report suggests the passenger jets might still be vulnerable.

TOPICS:
Advertisement
A new research institute has been awarded a significant grant from the Natural Environment Research Council to explore how techniques for documenting ancient footprints can help forensic scientists understand modern-day crime scenes.

Ancient Footprints Can Help to Understand Modern-Day Crime Scenes

April 16, 2015 11:23 am | by Bournemouth University | Comments

A new research institute has been awarded a significant grant from the Natural Environment Research Council to explore how techniques for documenting ancient footprints can help forensic scientists understand modern-day crime scenes.

TOPICS:
Major sponsors of cyber warfare forces are reaching a state of deterrence resembling the mutually assured destruction in nuclear weapons standoffs, former U.S. national intelligence director Dennis Blair said recently.

Deterence Keeps Cyber War Cold

April 16, 2015 11:07 am | by Tim Hornyak, Computerworld | Comments

Major sponsors of cyber warfare forces are reaching a state of deterrence resembling the mutually assured destruction in nuclear weapons standoffs, former U.S. national intelligence director Dennis Blair said recently.

TOPICS:
Researchers have developed a statistical model that allows them to tell where a dust sample came from within the continental United States based on the DNA of fungi found in the sample. The primary goal of the research was to develop a new forensic biolog

Dust Samples Traced Using Fungal DNA

April 16, 2015 10:28 am | by NC State University | Comments

Researchers have developed a statistical model that allows them to tell where a dust sample came from within the continental United States based on the DNA of fungi found in the sample. The primary goal of the research was to develop a new forensic biology tool for law enforcement or archeologists.

TOPICS:
On Dec. 7, 1941, the USS Oklahoma was hit with numerous torpedoes and bombs during Japan’s fierce and shocking bombardment of Pearl Harbor, killing some 429 service members. The Pentagon has now decided to exhume unidentified remains held at the National

USS Oklahoma Remains to be Exhumed, Commingled DNA Examined

April 15, 2015 12:53 pm | by Dan Lamothe, The Washington Post | Comments

On Dec. 7, 1941, the USS Oklahoma was hit with numerous torpedoes and bombs during Japan’s fierce and shocking bombardment of Pearl Harbor, killing some 429 service members. The Pentagon has now decided to exhume unidentified remains held at the National Memorial Cemetery of the Pacific in Honolulu, Hawaii, do DNA testing, and return any identified remains to families that want them.

TOPICS:
Collecting evidence, finding clues and investigating crimes can sound like a scene out of any Hollywood thriller. Pouring magnetic dust over a fingerprint detail in a forensic laboratory, Sarah Tariq Khoory is one of the few Emirati students learning fore

Forensic Course Now Taught in Dubai

April 15, 2015 12:08 pm | by Muaz Shabandri, Khaleej Times | Comments

Collecting evidence, finding clues and investigating crimes can sound like a scene out of any Hollywood thriller. Pouring magnetic dust over a fingerprint detail in a forensic laboratory, Sarah Tariq Khoory is one of the few Emirati students learning forensic science at Amity University’s Dubai campus.

TOPICS:
Kaspersky Lab has recorded a rare and unusual example of one cyber criminal attacking another. It believes that this could mark the emergence of a new trend in cybercriminal activity: the APT wars.

APT Groups Attack Each Other

April 15, 2015 11:13 am | by Kaspersky Labs | Comments

Kaspersky Lab has recorded a rare and unusual example of one cyber criminal attacking another. It believes that this could mark the emergence of a new trend in cybercriminal activity: the APT wars.

TOPICS:
If you're looking to reduce the pool of possible zero-day vulnerabilities that could potentially be used for criminal or state-sponsored breaches of computer and network security, throwing people and money at the problem isn't necessarily going to solve i

Researchers Try to Hack the Economics of Zero-Day Bugs

April 15, 2015 10:42 am | by Sean Gallagher, Ars Technica | Comments

If you're looking to reduce the pool of possible zero-day vulnerabilities that could potentially be used for criminal or state-sponsored breaches of computer and network security, throwing people and money at the problem isn't necessarily going to solve it. At least, that's the conclusion from a team of researchers at MIT, Harvard, and the security firm HackerOne.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading