Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third

Security Software Found Using Superfish-Style Code

February 23, 2015 3:14 pm | by Dan Goodin, Ars Technica | Comments

Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third of the Internet's Transport Layer Security certificates, making it the world's biggest certificate authority.

TOPICS:
An academic is asking a New Mexico court to order a death certificate for Billy the Kid to settle questions about whether the infamous outlaw was actually killed in 1881.

Death Certificate Sought for Outlaw Billy the Kid

February 23, 2015 11:04 am | Comments

An academic is asking a New Mexico court to order a death certificate for Billy the Kid to settle questions about whether the infamous outlaw was actually killed in 1881.

TOPICS:
“If it will burn, we’ll set it on fire,” said Lenwood S. Reeves, a certified investigator at the Fire Research Laboratory in Beltsville, Md., where he and nearly 70 colleagues with the Bureau of Alcohol, Tobacco, Firearms and Explosives work to understand

Inside the World's Largest Fire Investigation Facility

February 23, 2015 10:50 am | by Lynh Bui, The Washington Post | Comments

“If it will burn, we’ll set it on fire,” said Lenwood Reeves, a certified investigator at the Fire Research Laboratory in Beltsville, Maryland, where he and nearly 70 colleagues with the Bureau of Alcohol, Tobacco, Firearms and Explosives work to understand how fires start and why.

TOPICS:
Advertisement
Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen comedy was fueling an international imbroglio replete with tit

'Juicy' Hackers Protect Data, Thwart Cybercrime

February 23, 2015 10:40 am | by Brennen Jensen, Johns Hopkins Gazette | Comments

Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen comedy was fueling an international imbroglio replete with tit-for-tat cyber attacks. Welcome to Anton Dahbura's world.

TOPICS:
The Armed Forces DNA Identification Laboratory’s Emerging Technologies Section is leading the way in developing new strategies and technologies to identify exceptionally challenging DNA samples submitted to the lab. This presentation gives an overview of

Technologies for Identifying Human Remains: Training Video

February 23, 2015 10:15 am | by NIJ Forensic Technology Center of Excellence | Comments

The Armed Forces DNA Identification Laboratory’s Emerging Technologies Section is leading the way in developing new strategies and technologies to identify exceptionally challenging DNA samples submitted to the lab. This presentation gives an overview of the laboratory’s new Next-Generation Sequencing instrumentation and protocol development, and its impact on sample processing.

TOPICS:
Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases.

DNA Evidence Can be Faked

February 23, 2015 9:59 am | by Ernie Austin, Associate Editor | Comments

Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases.

TOPICS:
Sitting quietly in his office, Prof. Wesley Vernon occasionally thinks about how to   commit the perfect murder. So far all he has come up with is, "get as far away as   possible for the crime scene" and "pay someone to pay someone to pay someone to do

Has forensic science made it impossible to commit the perfect crime?

February 20, 2015 12:36 pm | by Sarah Freeman, The Yorkshire Post | Comments

Sitting quietly in his office, Prof. Wesley Vernon occasionally thinks about how to commit the perfect murder. So far all he has come up with is, "get as far away as possible for the crime scene" and "pay someone to pay someone to pay someone to do it for you." It’s not exactly the plot of a Hollywood thriller, but then he knows just how difficult it is to get away with murder these days.

TOPICS:
A bloody comforter found on the bed of a Utah doctor's ex-wife shows she was   attacked and her death was staged to look like a suicide, a blood spatter expert   testified. Rod Englert unfurled the brightly colored green-and-blue comforter during   the se

Expert: Blood Spatter Indicates Struggle

February 20, 2015 12:13 pm | by Lindsay Whitehurst, Associated Press | Comments

A bloody comforter found on the bed of a Utah doctor's ex-wife shows she was attacked and her death was staged to look like a suicide, a blood spatter expert testified. Rod Englert unfurled the brightly colored green-and-blue comforter during the second day of the trial against Salt Lake City pediatrician John Brickman Wall, who is accused of killing the cancer researcher amid a bitter custody dispute.

TOPICS:
Advertisement
A private lab in Texas will perform DNA tests on old biological material from a 1980s Minneapolis serial killer case, a Hennepin County judge has ruled.

Texas Lab Will Test DNA in Minneapolis Serial Murder Case

February 20, 2015 11:57 am | by Pam Louwagie, Star Tribune | Comments

A private lab in Texas will perform DNA tests on old biological material from a 1980s Minneapolis serial killer case, a Hennepin County judge has ruled.

TOPICS:
The North Louisiana Criminalistics Laboratory being constructed in Shreveport promises to offer high-level forensic testing services. But despite receiving $26 million from the government in capital outlay funds the crime lab doesn't have enough money for

High-Level Forensic Lab Has No Funds for Extra Staff

February 20, 2015 11:48 am | by Associated Press | Comments

The North Louisiana Criminalistics Laboratory being constructed in Shreveport promises to offer high-level forensic testing services. But despite receiving $26 million from the government in capital outlay funds the crime lab doesn't have enough money for staff.

TOPICS:
Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely

Phones Tracked Using Power Consumption Analysis

February 20, 2015 11:12 am | by Andy Greenberg, Wired | Comments

Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption.

TOPICS:
The exposure of an all-star hacker group thought to be affiliated with the National Security Agency is both a feather in the spy agency’s cap and a setback for intelligence-gathering on Islamic extremists, some threat analysts say.

NSA Out-Hacking Chinese, Russians

February 20, 2015 10:42 am | by Aliya Sternstein, Defense One | Comments

The exposure of an all-star hacker group thought to be affiliated with the National Security Agency is both a feather in the spy agency’s cap and a setback for intelligence-gathering on Islamic extremists, some threat analysts say.

TOPICS:
The co-creator of sophisticated BlackShades malware pleaded guilty to a criminal charge after authorities said his product infected over a half-million computers in more than 100 countries.

BlackShades Owner Pleads Guilty in US in Malware Case

February 19, 2015 12:53 pm | by Larry Neumeister, Associated Press | Comments

The co-creator of sophisticated BlackShades malware pleaded guilty to a criminal charge after authorities said his product infected over a half-million computers in more than 100 countries.

TOPICS:
A coroner says a mix-up at the state crime lab led an Augusta area family to bury the wrong body during a closed-casket funeral.

Coroner: Wrong Body Buried After Crime Lab Mix-Up in Georgia

February 19, 2015 12:23 pm | by Associated Press | Comments

A coroner says a mix-up at the state crime lab led an Augusta area family to bury the wrong body during a closed-casket funeral.

TOPICS:
The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.

Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems

February 19, 2015 12:10 pm | by NIST | Comments

The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power. 

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading