Advertisement
 
News
Subscribe to Forensic Magazine
Computer whizzes at the National Security Agency were called in only after the Office of Personnel Management detected its network had been penetrated, NSA Director Adm. Michael Rogers said Tuesday night. Ultimately, hackers made off with personal informa

NSA Stepped in to Thwart OPM Hackers - Eventually

September 9, 2015 12:37 pm | by Aliya Sternstein, Next Gov | Comments

Computer whizzes at the National Security Agency were called in only after the Office of Personnel Management detected its network had been penetrated, NSA Director Adm. Michael Rogers said Tuesday night. Ultimately, hackers made off with personal information on millions of national security personnel. 

TOPICS:
As President Xi Jinping of China prepares for his first state visit to the United States this month, Washington has warned that it could hit Chinese companies with sanctions over digital attacks for trade secrets. Beijing is now pushing back in an unortho

China Flexes Tech Muscles Before State Visit

September 9, 2015 12:14 pm | by Paul Mozur and Jane Perlez, The New York Times | Comments

As President Xi Jinping of China prepares for his first state visit to the United States this month, Washington has warned that it could hit Chinese companies with sanctions over digital attacks for trade secrets. Beijing is now pushing back in an unorthodox way: by organizing a technology forum to demonstrate its own sway over the American tech industry.

TOPICS:
While investigating the infamous Russian-speaking cyberespionage actor Turla, Kaspersky Lab researchers have discovered that the group is evading detection of its activity and physical location of its Command and Control servers (C&C) by using security we

Cyberespionage Group Exploits Satellites for Ultimate Anonymity

September 9, 2015 11:45 am | by Help Net Security | Comments

While investigating the infamous Russian-speaking cyberespionage actor Turla, Kaspersky Lab researchers have discovered that the group is evading detection of its activity and physical location of its Command and Control servers (C&C) by using security weaknesses in global satellite networks.

TOPICS:
Advertisement
The rise of attacks that use file-less malware and other anti-forensics measures is creating a greater-than-ever skills gap in the cybersecurity industry.

Anti-Forensic Malware Widens Cyber-Skills Gap

September 9, 2015 9:00 am | by Tara Seals, Infosecurity Magazine | Comments

The rise of attacks that use file-less malware and other anti-forensics measures is creating a greater-than-ever skills gap in the cybersecurity industry.

TOPICS:

Man Who Got Life for Marijuana Charge Goes Free in Missouri

September 8, 2015 1:19 pm | by Summer Ballentine, AP | Comments

A man sentenced to life without parole on a marijuana-related charge was freed Tuesday from a Missouri prison after being behind bars for more than two decades — a period in which the nation's attitudes toward pot steadily softened.

Violent 72 Hours After 12 Shot, 5 Killed Over Labor Day Weekend

September 8, 2015 1:12 pm | by Mark Becker and Blake Hanson, WSOC | Comments

It has been a violent Labor Day weekend in Charlotte after 12 people were shot, and five of them killed, in multiple shootings - and one of the victims was a 7-year-old boy.

TOPICS:
Two major security vendors are working quickly to fix problems in their products after security researchers publicly disclosed vulnerabilities over the past few days.

Kaspersky and FireEye Rush to Fix Flaws

September 8, 2015 11:06 am | by Phil Muncaster, Infosecurity Magazine | Comments

Two major security vendors are working quickly to fix problems in their products after security researchers publicly disclosed vulnerabilities over the past few days.

TOPICS:
The Latvian man accused of helping create the Gozi virus, which United States prosecutors dubbed "one of the most financially destructive computer viruses in history," has pleaded guilty.

Man Who Helped Code Highly Destructive Financial Malware Pleads Guilty

September 8, 2015 10:48 am | by Cyrus Farivar, Ars Technica | Comments

The Latvian man accused of helping create the Gozi virus, which United States prosecutors dubbed "one of the most financially destructive computer viruses in history," has pleaded guilty.

TOPICS:
Advertisement
The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories of actions and investments that contribute to cyber security. The five categories in the scale are Architecture, Passive Defense, Active Defense, Intellige

The Sliding Scale of Cyber Security

September 8, 2015 10:34 am | by Robert M. Lee, New America | Comments

The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories of actions and investments that contribute to cyber security. The five categories in the scale are Architecture, Passive Defense, Active Defense, Intelligence, and Offense. The continuum between the five categories helps visualize that not all actions are static or easily defined.

TOPICS:
Mozilla, creator of the Firefox web browser, said hackers had stolen security-sensitive information from Bugzilla, its bug tracker, and used it to "attack" Firefox users.

Mozilla Says Hackers Stole Information From Bugzilla

September 8, 2015 10:22 am | by Reuters | Comments

Mozilla, creator of the Firefox web browser, said hackers had stolen security-sensitive information from Bugzilla, its bug tracker, and used it to "attack" Firefox users.

TOPICS:
Microsoft Corp. gets a second chance to prove it's entitled to keep data stored overseas out of the hands of U.S. investigators when its lawyers appear before a federal appeals court Wednesday, but the computer software giant is already hedging its bets,

Federal Appeals Court to Settle Fight Over International Privacy

September 8, 2015 10:12 am | by Larry Neumeister, Associated Press | Comments

Microsoft Corp. gets a second chance to prove it's entitled to keep data stored overseas out of the hands of U.S. investigators when its lawyers appear before a federal appeals court Wednesday, but the computer software giant is already hedging its bets, calling on Congress to clarify the law.

TOPICS:
Forensic fiber examination is one of the most established forensic evidence types. It is one of the most researched and respected of all evidence types among the global forensic science community. So why is it that the use of fibers as tool in forensic in

Is a Vital Forensic Skill Dying Out?

September 4, 2015 2:58 pm | by Tiernan Coyle, The Justice Gap | Comments

Forensic fiber examination is one of the most established forensic evidence types. It is one of the most researched and respected of all evidence types among the global forensic science community. So why is it that the use of fibers as tool in forensic investigations has declined so much?

TOPICS:
Investigators continue working to identify the remains found inside a burning truck but it could be some time before they have an answer. Caddo Parish, Louisiana Coroner Todd Thoma is tasked with identifying the remains.

Coroner's Challenge to ID Burn Victim's Remains

September 4, 2015 12:09 pm | by Zach Beaird, The Shreveport Times | Comments

Investigators continue working to identify the remains found inside a burning truck but it could be some time before they have an answer. Caddo Parish, Louisiana Coroner Todd Thoma is tasked with identifying the remains.

TOPICS:
Quickly moving through security checkpoints by showing your hand to a scanner seems straight out of science fiction, but the National Institute of Standards and Technology is working with industry to bring fast, touchless fingerprint readers out of the la

Contactless Fingerprint Technology Could be Here Soon

September 4, 2015 10:23 am | by NIST | Comments

Quickly moving through security checkpoints by showing your hand to a scanner seems straight out of science fiction, but the National Institute of Standards and Technology is working with industry to bring fast, touchless fingerprint readers out of the lab and into the marketplace.

TOPICS:
Later this month, a North Carolina high school student will appear in a state court and face five child pornography-related charges for engaging in consensual sexting with his girlfriend.

2 North Carolina Teens Hit With Child Porn Charges After Consensual Sexting

September 4, 2015 9:45 am | by Cyrus Farivar, Ars Technica | Comments

Later this month, a North Carolina high school student will appear in a state court and face five child pornography-related charges for engaging in consensual sexting with his girlfriend.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading