Two more software makers have been caught adding dangerous, Superfish-style man-in-the-middle code to the applications they publish. The development is significant because it involves AV company Lavasoft and Comodo, a company that issues roughly one-third of the Internet's Transport Layer Security certificates, making it the world's biggest certificate authority.
An academic is asking a New Mexico court to order a death certificate for Billy the Kid to settle questions about whether the infamous outlaw was actually killed in 1881.
“If it will burn, we’ll set it on fire,” said Lenwood Reeves, a certified investigator at the Fire Research Laboratory in Beltsville, Maryland, where he and nearly 70 colleagues with the Bureau of Alcohol, Tobacco, Firearms and Explosives work to understand how fires start and why.
Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen comedy was fueling an international imbroglio replete with tit-for-tat cyber attacks. Welcome to Anton Dahbura's world.
The Armed Forces DNA Identification Laboratory’s Emerging Technologies Section is leading the way in developing new strategies and technologies to identify exceptionally challenging DNA samples submitted to the lab. This presentation gives an overview of the laboratory’s new Next-Generation Sequencing instrumentation and protocol development, and its impact on sample processing.
Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases.
Sitting quietly in his office, Prof. Wesley Vernon occasionally thinks about how to commit the perfect murder. So far all he has come up with is, "get as far away as possible for the crime scene" and "pay someone to pay someone to pay someone to do it for you." It’s not exactly the plot of a Hollywood thriller, but then he knows just how difficult it is to get away with murder these days.
A bloody comforter found on the bed of a Utah doctor's ex-wife shows she was attacked and her death was staged to look like a suicide, a blood spatter expert testified. Rod Englert unfurled the brightly colored green-and-blue comforter during the second day of the trial against Salt Lake City pediatrician John Brickman Wall, who is accused of killing the cancer researcher amid a bitter custody dispute.
A private lab in Texas will perform DNA tests on old biological material from a 1980s Minneapolis serial killer case, a Hennepin County judge has ruled.
The North Louisiana Criminalistics Laboratory being constructed in Shreveport promises to offer high-level forensic testing services. But despite receiving $26 million from the government in capital outlay funds the crime lab doesn't have enough money for staff.
Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption.
The exposure of an all-star hacker group thought to be affiliated with the National Security Agency is both a feather in the spy agency’s cap and a setback for intelligence-gathering on Islamic extremists, some threat analysts say.
The co-creator of sophisticated BlackShades malware pleaded guilty to a criminal charge after authorities said his product infected over a half-million computers in more than 100 countries.
A coroner says a mix-up at the state crime lab led an Augusta area family to bury the wrong body during a closed-casket funeral.
Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control SystemsFebruary 19, 2015 12:10 pm | by NIST | Comments
The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.