Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Kirk Odom was convicted of a 1981 rape and robbery after a woman identified him as her attacker and an FBI specialist testified that hair on her nightgown was similar to hair on Odom's head. But DNA testing some 30 years later affirmed what Odom long had

FBI Hair Analysis Problems Reveal Limits of Forensic Science

May 14, 2015 1:10 pm | by Eric Tucker, Associated Press | Comments

Kirk Odom was convicted of a 1981 rape and robbery after a woman identified him as her attacker and an FBI specialist testified that hair on her nightgown was similar to hair on Odom's head. But DNA testing some 30 years later affirmed what Odom long had maintained: The hair wasn't his.

TOPICS:
APTs are designed to gain access to a network, acquire data, and secretly monitor the   targeted computer systems over long periods. Many researchers agree that the term   “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by

Anatomy of an APT Attack: Step by Step Approach

May 14, 2015 12:38 pm | by Ashiq JA, Infosec Institute | Comments

APTs are designed to gain access to a network, acquire data, and secretly monitor the targeted computer systems over long periods. Many researchers agree that the term “Advanced Persistent Threat” was first coined by the U.S. Government during 2005 by security analysts to describe complex cyber attacks against specific targets for financial or informational gains by a well-funded group of individuals.  

TOPICS:
Despite the importance of tool mark analysis in the forensic sciences, the imaging and comparison of tool marks remains a difficult and time-consuming endeavor. The ability to certify two cases as highly similar is therefore a function of both the ability

3D Software Eliminates False Positives in Cartridge Case Comparisons

May 14, 2015 11:26 am | by Ryan Lilien, NIJ | Comments

Despite the importance of tool mark analysis in the forensic sciences, the imaging and comparison of tool marks remains a difficult and time-consuming endeavor. The ability to certify two cases as highly similar is therefore a function of both the ability to capture a high-resolution measurement of each case and the ability to identify and match relevant structural features. 

TOPICS:
Advertisement
A Russian hacking group was poised to launch a cyber assault on U.S. banks, but may have withdrawn those plans after being discovered.

Russian Hacking Group was Set to Hit US Banks

May 14, 2015 10:37 am | by Cory Bennett, The Hill | Comments

A Russian hacking group was poised to launch a cyber assault on U.S. banks, but may have withdrawn those plans after being discovered.

TOPICS:
The Sally Beauty chain confirmed Thursday that it has suffered its second data breach in just over two years. The beauty products seller had notified customers earlier this month that it was investigating reports of unusual activity on payment cards used

Sally Beauty Confirms Second Data Breach

May 14, 2015 10:18 am | by The Associated Press | Comments

The Sally Beauty chain confirmed Thursday that it has suffered its second data breach in just over two years. The beauty products seller had notified customers earlier this month that it was investigating reports of unusual activity on payment cards used at some of its U.S. locations.

TOPICS:
Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

New Domains Revitalize Phishing Campaigns

May 14, 2015 9:56 am | by Charlie Osborne, ZDNet | Comments

Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

TOPICS:
Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University

New KBI Crime Lab Called Needed Investment in Public Safety

May 13, 2015 2:35 pm | by Melissa Brunner, WIBW.com | Comments

Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University campus is long overdue.

TOPICS:
The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is vol

One of NJ's Largest Medical Examiner Offices Failed Accreditation, But Does It Matter?

May 13, 2015 2:18 pm | by Justin Zaremba, NJ.com | Comments

The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is voluntary, and most medical examiner offices throughout the country operate without accreditation.

TOPICS:
Advertisement
Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in

Romania Helps Ukraine Fight Russian Hacking

May 13, 2015 1:44 pm | by Alizon Mutler, Associated Press | Comments

Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in the fight against hacking.

TOPICS:
Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

VENOM Zero-Day May Affect Thousands Of Cloud, Virtualization Products

May 13, 2015 1:30 pm | by Sara Peters, Dark Reading | Comments

Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

TOPICS:
Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables crimina

Why So Much Cime is Cyber-Enabled

May 13, 2015 1:14 pm | by Mathew J. Schwartz, Gov Info Security | Comments

Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables criminals to hire specialists with skills or acquire attack tools on an as-needed basis.

TOPICS:
A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

DDoS Botnet Makes Slaves of Home and Office Routers

May 13, 2015 12:59 pm | by Charlie Osborne, ZD Net | Comments

A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

TOPICS:
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

Scammers Draining Payment Cards Linked to Starbucks Card Accounts

May 13, 2015 12:51 pm | by Zeljka Zorz, Help Net Security | Comments

Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

TOPICS:
The Internal Revenue Service’s Criminal Investigation division has created a cybercrime unit to combat the growing trend of identity theft-related tax fraud as the problem morphs into data breaches and becomes more international in scope.

IRS Creates Cybercrime Unit to Battle Identity Theft

May 12, 2015 1:48 pm | by Michael Cohn, Accounting Today | Comments

The Internal Revenue Service’s Criminal Investigation division has created a cybercrime unit to combat the growing trend of identity theft-related tax fraud as the problem morphs into data breaches and becomes more international in scope.

TOPICS:
Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Department hopes to overcome.

Employing Technology to Ensure Privacy

May 12, 2015 1:27 pm | by Eric Chabrow, Gov Info Security | Comments

Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Department hopes to overcome.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading