Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The United States leads the world in hosting malicious servers that are used to   remotely command and control infected user machines and systems. And the US is the   second-most frequent target of those systems, a new report from Level 3   Communications

US Hosts the Most Botnet Servers

June 22, 2015 10:31 am | by Jai Vijayan, Dark Reading | Comments

The United States leads the world in hosting malicious servers that are used to remotely command and control infected user machines and systems. And the US is the second-most frequent target of those systems, a new report from Level 3 Communications shows.  

TOPICS:
A cyber attack against Warsaw's Chopin airport caused a number of flights to be   delayed and canceled altogether.

Hackers Prompt Flight Cancellation at Polish Airport

June 22, 2015 10:12 am | by Charlie Osborne, ZDNet | Comments

A cyber attack against Warsaw's Chopin airport caused a number of flights to be delayed and canceled altogether.

TOPICS:
Biologist Samuel Wasser is a pioneer in using DNA evidence to trace the origin of illegal ivory and help police an international trade that is decimating African elephant populations. The broadest application yet uses DNA from tons of ivory samples associ

Evidence From Ivory DNA Identifies Two Main Elephant Poaching Hotspots

June 19, 2015 2:22 pm | by Hannah Hickey and Michelle Ma, University of Washington | Comments

Biologist Samuel Wasser is a pioneer in using DNA evidence to trace the origin of illegal ivory and help police an international trade that is decimating African elephant populations. The broadest application yet uses DNA from tons of ivory samples associated with large-scale trafficking. Results show that over the past decade, ivory has largely come from just two areas in Africa – one each for the forest and savanna elephants. 

TOPICS:
Advertisement
Prosecutors in the Colorado theater shooting trial were wrapping up their case Friday against James Holmes after eight weeks of testimony in which they sought to show that the former neuroscience student meticulously planned and carried out the 2012 massa

Prosecutors Wrap Up Emotional Case in Theater Shooting Trial

June 19, 2015 1:23 pm | by Sadie Gurman, Associated Press | Comments

Prosecutors in the Colorado theater shooting trial were wrapping up their case Friday against James Holmes after eight weeks of testimony in which they sought to show that the former neuroscience student meticulously planned and carried out the 2012 massacre while knowing it was wrong.

TOPICS:
The theft of data from the Office of Personnel Management (OPM) has made great fodder for two weeks of cable news. Banner headlines have declared it an act of cyber warfare carried out by the Chinese government. Yet, while Twitter has been abuzz, official

Why the US Hasn't Pinned the OPM Hack on China

June 19, 2015 12:58 pm | by Rob Knake, Defense One | Comments

The theft of data from the Office of Personnel Management (OPM) has made great fodder for two weeks of cable news. Banner headlines have declared it an act of cyber warfare carried out by the Chinese government. Yet, while Twitter has been abuzz, official statements attributing the attack have yet to materialize.

TOPICS:
Of the myriad cybersecurity challenges facing the Navy, two stand out: spear phishing and more swiftly deploying software patches. That was the gist of a June 18 update on Navy defensive cyber operations given by Capt. David Bondura, U.S. Fleet Cyber Comm

Navy Challenged by Spear Phishing, Software Patches

June 19, 2015 12:46 pm | by Sean Lyngaas, FCW | Comments

Of the myriad cybersecurity challenges facing the Navy, two stand out: spear phishing and more swiftly deploying software patches. That was the gist of a June 18 update on Navy defensive cyber operations given by Capt. David Bondura, U.S. Fleet Cyber Command’s assistant chief of staff for operations.

TOPICS:
The energy grid is once again found to be vulnerable, with a serious flaw in the Nova-Wind Turbine human-machine (HMI) interface, which would allow remote code execution.

Wind Turbines Open to Hijacking

June 19, 2015 12:03 pm | by Tara Seals, Infosecurity Magazine | Comments

The energy grid is once again found to be vulnerable, with a serious flaw in the Nova-Wind Turbine human-machine (HMI) interface, which would allow remote code execution.

TOPICS:
The National Association of Medical Examiners denied reaccreditation to New Jersey's Northern Regional Medical Examiner's Office last year because of deficiencies it found in 10 areas of operation, six of which were considered serious violations.

NJ Regional Medical Examiner's Office Failed Accreditation Review in 10 Areas

June 18, 2015 2:17 pm | by Kevin C. Shelly, NJ,com | Comments

The National Association of Medical Examiners denied reaccreditation to New Jersey's Northern Regional Medical Examiner's Office last year because of deficiencies it found in 10 areas of operation, six of which were considered serious violations.

TOPICS:
Advertisement
Massachusetts highest court has ruled that the twin brother of a man charged with murder does not have to share his DNA profile with Suffolk prosecutors, who contend the genetic information could help prove who stabbed a South Boston woman to death in her

Murder Suspect's Twin Does Not Have to Give DNA, High Court Rules

June 18, 2015 1:07 pm | by John R. Ellement, The Boston Globe | Comments

Massachusetts highest court has ruled that the twin brother of a man charged with murder does not have to share his DNA profile with Suffolk prosecutors, who contend the genetic information could help prove who stabbed a South Boston woman to death in her home in 2012.

TOPICS:
One of two Wisconsin girls accused of trying to kill a classmate to please a fictitious horror character has a father who was diagnosed with schizophrenia, a defense witness testified Wednesday.

Family History of Schizophrenia Revealed in Slender Man Case

June 18, 2015 12:46 pm | by The Associated Press | Comments

One of two Wisconsin girls accused of trying to kill a classmate to please a fictitious horror character has a father who was diagnosed with schizophrenia, a defense witness testified Wednesday.

TOPICS:
One of two former U.S. agents charged with pocketing hundreds of thousands of dollars in digital money during the investigation of the illegal Silk Road Internet drug emporium reached a plea agreement with prosecutors.

Ex-US Agent Charged With Bitcoin Theft to Plead Guilty

June 18, 2015 11:37 am | by Joel Rosenblatt, Bloomberg | Comments

One of two former U.S. agents charged with pocketing hundreds of thousands of dollars in digital money during the investigation of the illegal Silk Road Internet drug emporium reached a plea agreement with prosecutors.

TOPICS:
Researchers have uncovered huge holes in the application sandboxes protecting Apple's OS X and iOS operating systems, a discovery that allows them to create apps that pilfer iCloud, Gmail and banking passwords and can also siphon data from 1Password, Ever

Serious OS X and iOS Flaws Let Hackers Steal Keychain, 1Password Contents

June 18, 2015 10:27 am | by Dan Goodin, Ars Technica | Comments

Researchers have uncovered huge holes in the application sandboxes protecting Apple's OS X and iOS operating systems, a discovery that allows them to create apps that pilfer iCloud, Gmail and banking passwords and can also siphon data from 1Password, Evernote and other apps.

TOPICS:
A vulnerability has been found in the Swift keyboard software, preinstalled on more than 600 million Samsung devices, including the recently released Galaxy S6. The flaw can be exploited to allow a remote attacker to execute arbitrary code on the user's p

Keyboard Vulnerability Leaves 600 Million Samsung Devices at Risk

June 18, 2015 10:12 am | by Tara Seals, Infosecurity Magazine | Comments

A vulnerability has been found in the Swift keyboard software, preinstalled on more than 600 million Samsung devices, including the recently released Galaxy S6. The flaw can be exploited to allow a remote attacker to execute arbitrary code on the user's phone.

TOPICS:
Democrats and Republicans on the House Oversight and Government Reform Committee were united Tuesday in heaping scorn upon the leaders of the Office of Personnel Management, the agency whose data was breached last year in two massive cyberattacks only rec

Officials Say Security Lapses Left System Open to Hackers

June 17, 2015 10:43 am | by Ken Dilanian, Associated Press | Comments

Democrats and Republicans on the House Oversight and Government Reform Committee were united Tuesday in heaping scorn upon the leaders of the Office of Personnel Management, the agency whose data was breached last year in two massive cyber attacks only recently revealed.

TOPICS:
Security experts have warned of a new, state-sponsored targeted attack campaign against government and military organizations in several countries around the South China Sea.

Operation Lotus Blossom Sets Sights on Asian Military

June 17, 2015 9:59 am | by Phil Muncaster, Infosecurity Magazine | Comments

Security experts have warned of a new, state-sponsored targeted attack campaign against government and military organizations in several countries around the South China Sea.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading