Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Adobe users have been urged to patch a newly-released critical vulnerability in Flash Player, after researchers warned it is being exploited in the wild by sophisticated Chinese hacking group APT3.

Adobe Patches Critical Flash Flaw Exploited by APT3

June 24, 2015 10:41 am | by Phil Muncaster, Infosecurity Magazine | Comments

Adobe users have been urged to patch a newly-released critical vulnerability in Flash Player, after researchers warned it is being exploited in the wild by sophisticated Chinese hacking group APT3.

TOPICS:
Financial services organizations - traditionally some of the best-fortified against cyber attacks - see three times as many attack attempts by cyber criminals than other industries do, a new study by Raytheon/Websense shows.

Banks Targeted By Hackers Three Times More Than Other Sectors

June 24, 2015 10:20 am | by Kelly Jackson Higgins, Dark Reading | Comments

Financial services organizations - traditionally some of the best-fortified against cyber attacks - see three times as many attack attempts by cyber criminals than other industries do, a new study by Raytheon/Websense shows.

TOPICS:
U.S. securities regulators are investigating a group of hackers suspected of breaking into corporate email accounts to steal information to trade on, such as confidential details about mergers, according to people familiar with the matter.

SEC Hunts Hackers Who Stole Corporate Emails to Trade Stocks

June 24, 2015 10:00 am | by Sarah N. Lynch and Joseph Menn, Reuters | Comments

U.S. securities regulators are investigating a group of hackers suspected of breaking into corporate email accounts to steal information to trade on, such as confidential details about mergers, according to people familiar with the matter.

TOPICS:
Advertisement
The Urban Institute contracted with the National Institute of Justice (NIJ) to conduct an evaluation of its 2008 Forensic DNA Unit Efficiency Improvement Program. The findings suggest that there is some evidence in support of the hypothesis that crime lab

Evaluation of the Forensic DNA Unit Efficiency Improvement Program

June 24, 2015 8:28 am | by David Hayeslip, Sara Debus-Sherrill and Kelly A. Walsh, NIJ | Comments

The Urban Institute contracted with the NIJ to conduct an evaluation of its 2008 Forensic DNA Unit Efficiency Improvement Program. The findings suggest that there is some evidence in support of the hypothesis that crime lab DNA processing can be improved in novel and innovative ways besides simply increasing capacity.

TOPICS:

Oscar-Winning Composer Owns Plane That Crashed, Killed Pilot

June 23, 2015 1:40 pm | by The Associated Press | Comments

Jay Cooper, an attorney for Horner, said that the plane was one of several owned by the 61-year-old composer and that no one has heard from him since the crash.

TOPICS:

Rare DNA Process Allowed in Whalen Murder Case

June 23, 2015 1:37 pm | by Edith Brady-Lunny, Pantagraph.com | Comments

Whalen is serving 60 years in the 1991 death of his father, William Whalen, whose badly beaten body was found at the former Twenty Grand Tap, a bar the elder Whalen owned in downtown Bloomington.

TOPICS:
The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday.

Signs of OPM Hack Turn Up at Another Federal Agency

June 23, 2015 11:43 am | by Aliya Sternstein, Nextgov | Comments

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed. 

TOPICS:
A serious vulnerability in RubyGems, a package manager for the Ruby programming language, can be exploited to trick end users into installing malware from attacker-controlled gem servers, Trustwave researchers have discovered.

RubyGems Vulnerability Can Lead to Installation of Malicious Apps

June 23, 2015 10:48 am | by Zeljka Zorz, Help Net Security | Comments

A serious vulnerability in RubyGems, a package manager for the Ruby programming language, can be exploited to trick end users into installing malware from attacker-controlled gem servers, Trustwave researchers have discovered.

TOPICS:
Advertisement
Cannabis is the most commonly exchanged product on the Deep Web, according to a major new study of the unindexed web from Trend Micro.

Cannabis Comes Out On Top in Deep Web Trawl

June 23, 2015 10:27 am | by Phil Muncaster, Infosecurity Magazine | Comments

Cannabis is the most commonly exchanged product on the Deep Web, according to a major new study of the unindexed web from Trend Micro.

TOPICS:
It's easy to assume that hackers work way above our pay grade. Electronic intruders must be able to exploit vulnerabilities in the software we use because they're evil geniuses, right? That may be the case in some very sophisticated attacks, experts say,

Programmers Could be Copying Security Flaws Into Software

June 23, 2015 9:55 am | by Laura Hautala, CNET | Comments

It's easy to assume that hackers work way above our pay grade. Electronic intruders must be able to exploit vulnerabilities in the software we use because they're evil geniuses, right? That may be the case in some very sophisticated attacks, experts say, but in others, not so much.

TOPICS:
The National Institute of Standards and Technology (NIST) has published the final version of its guidance for federal agencies to ensure that sensitive federal information remains confidential when stored in nonfederal information systems and organization

NIST Offers Guidelines for Protecting Sensitive Government Contractor Information

June 23, 2015 9:42 am | by NIST | Comments

The National Institute of Standards and Technology (NIST) has published the final version of its guidance for federal agencies to ensure that sensitive federal information remains confidential when stored in nonfederal information systems and organizations.

TOPICS:

NC Rape Victims Waiting 2+ Years for DNA Test Results

June 22, 2015 1:16 pm | by Ann McAdams, WECT | Comments

At last check, prosecutors in North Carolina say the state is still processing rape kits submitted from 2 and a half years ago, and the wait for kits to be tested in the state lab is getting longer.

TOPICS:

Police: Burglary Suspect Arrested After Falling Asleep at Crime Scene

June 22, 2015 1:05 pm | by Alexander Nguyen, Patch Staff | Comments

An 18-year-old Palm Springs man was arrested after he climbed into a bed and fell asleep in a home he allegedly burglarized, police reported.

TOPICS:

Often Years Pass Before Stolen Guns are Recovered

June 22, 2015 12:57 pm | by Edith Brady-Lunny | Comments

In 2013, the handgun used in an incident that left a 16-year-old Bloomington boy dead after a group of friends passed around the loaded weapon was traced to the burglary of a neighbor's home.

TOPICS:
The massive hack of the Office of Personnel Management has raised questions about whether government contractors may have inadvertently made the agency more vulnerable to attack.

OPM Hack Raises Questions About Security of Government Contractors

June 22, 2015 12:11 pm | by Erin Kelly, USA TODAY | Comments

The massive hack of the Office of Personnel Management has raised questions about whether government contractors may have inadvertently made the agency more vulnerable to attack.  

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading