Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

After Years of Forensic Investigation, Somerton Man's Identity Remains a Mystery

June 2, 2015 1:56 pm | by Lisa Zyga, Phys.org | Comments

As one of Australia's most infamous cold case mysteries, the enigma of the Somerton Man deals with a haunting situation: a man is found dead on a beach, and no one steps forward to identify him.

TOPICS:

New Sensing Tech Could Help Detect Chemical Weapons, Fraudulent Art

June 2, 2015 1:45 pm | by Cory Nealon, University at Buffalo | Comments

From airport security detecting explosives to art historians authenticating paintings, society’s thirst for powerful sensors is growing.

TOPICS:
The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with pl

NSA Phone Collection Bill Clears Senate Hurdle

June 2, 2015 12:07 pm | by Ken Dilanian, Associated Press | Comments

The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with planned changes to a House version.

TOPICS:
Advertisement
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

New Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

June 2, 2015 10:48 am | by Dan Goodin, Ars Technica | Comments

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

TOPICS:
Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective wh

Combat Wounded Marine Sees New Horrors in Role As Child Porn Hunter

June 2, 2015 10:31 am | by Howard Altman, Tampa Tribune | Comments

Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective who brought in a phone from a recent homicide case. It will be up to Gaertner, a computer forensics analyst, to sift through the data hidden on the phone to come up with evidence.

TOPICS:
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

Hiding Exploit Code in Images

June 2, 2015 10:16 am | by Zeljka Zorz, Help Net Security | Comments

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

TOPICS:
The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday.

IRS Needs to Do More to Fight Cyber Attacks, Watchdog Says

June 2, 2015 9:33 am | by Stephen Ohlemacher, Associated Press | Comments

The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday. The agency's inspector general outlined the security weaknesses a week after the IRS announced that criminals had stolen the personal information of 104,000 taxpayers from an IRS website. 

TOPICS:

Homicide Count for May in Baltimore Rises to 43

June 1, 2015 1:47 pm | by The Associated Press | Comments

Three fatal shootings in Baltimore on Sunday bring May's homicide count to 43, making it the most violent month in more than 40 years.

TOPICS:
Advertisement
Personal information of some 1.25 million of Japan's pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension Service's computer systems.

Hackers Stole Personal Info of Over a Million of Japanese Retirees

June 1, 2015 1:42 pm | by Zeljka Zorz, Help Net Security | Comments

Personal information of some 1.25 million of Japan's pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension Service's computer systems.

TOPICS:
If someone has been mugged, there's a mugger to catch. If a car is stolen, there'll be a thief to find. If a bank is robbed, there will be a robber to track down. And cyber crime? Not so much.

Attacking Cyber Crime Through Infrastructure, Not Individuals

June 1, 2015 1:34 pm | by BBC | Comments

If someone has been mugged, there's a mugger to catch. If a car is stolen, there'll be a thief to find. If a bank is robbed, there will be a robber to track down. And cyber crime? Not so much.

TOPICS:
In a remarkable turnaround, Senate Republicans have agreed to debate a House bill that would overhaul the National Security Agency's handling of Americans' calling records while preserving other domestic surveillance provisions. But that move didn't happe

Senate Takes Up House Bill but Fails to Avoid Spying Lapse

June 1, 2015 9:53 am | by Ken Dilanian, Associated Press | Comments

In a remarkable turnaround, Senate Republicans have agreed to debate a House bill that would overhaul the National Security Agency's handling of Americans' calling records while preserving other domestic surveillance provisions. But that move didn't happen soon enough to prevent legal authority for the programs from expiring at midnight Sunday.

TOPICS:
The United States tried to deploy a version of the Stuxnet computer virus to attack North Korea's nuclear weapons program five years ago but ultimately failed, according to people familiar with the covert campaign.

US Tried Stuxnet-Style Campaign Against North Korea But Failed

June 1, 2015 9:34 am | by Joseph Menn, Reuters | Comments

The United States tried to deploy a version of the Stuxnet computer virus to attack North Korea's nuclear weapons program five years ago but ultimately failed, according to people familiar with the covert campaign.

TOPICS:
In 2013, a pair of private investigators in the Bay Area embarked on a fairly run-of-the-mill case surrounding poached employees. But according to a federal indictment unsealed in February, their tactics sounded less like a California noir and something m

Hackers On Demand

May 29, 2015 11:24 am | by Steven Melendez, Fast Company | Comments

In 2013, a pair of private investigators in the Bay Area embarked on a fairly run-of-the-mill case surrounding poached employees. But according to a federal indictment unsealed in February, their tactics sounded less like a California noir and something more like sci-fi: To spy on the clients' adversaries, prosecutors say, they hired a pair of hackers.

TOPICS:
The dark web has become notorious for the sale of drugs, stolen financial data, and even guns, but in their latest crackdown, the feds are dragging another unlikely cash cow of the contraband underground into the spotlight: counterfeit coupons. For one fr

Inside a Giant Dark-Web Scheme to Sell Counterfeit Coupons

May 29, 2015 10:28 am | by Andy Greenberg, Wired | Comments

The dark web has become notorious for the sale of drugs, stolen financial data, and even guns, but in their latest crackdown, the feds are dragging another unlikely cash cow of the contraband underground into the spotlight: counterfeit coupons. For one fraudster, those fakes were good for tens of millions of dollars worth of every consumer product from kitty litter to Clif bars to condoms.  

TOPICS:
A fresh cyberspying campaign has been able to steal about 10,000 files from small-to-medium sized businesses — so far.

Grabit Spy Campaign Nabs 10,000 SMB Files

May 29, 2015 10:06 am | by Tara Seals, Infosecurity Magazine | Comments

A fresh cyberspying campaign has been able to steal about 10,000 files from small-to-medium sized businesses — so far.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading