Gonzalez, with forty years of experience in the field offered a master conference on the state of forensic sciences on the island during the 9th Symposium of Criminal Technics Tecnicrim 2015 which kicked off Wednesday at Havana´s International Convention Center.
An infamous advanced persistent threat hacking group known as Naikon is actually China's PLA Unit 78020 and a military intelligence expert there, traced to the attacks via his social media and other activity.
The Fifth Amendment right against compelled self-incrimination would be breached if two insider trading suspects were forced to turn over the passcodes of their locked mobile phones to the Securities and Exchange Commission, a federal judge has ruled.
With hackers and the security research community constantly finding new ways to break every piece of software that touches the Internet, it’s easy to get lost in the endless cycle of hacks and patches and hacks. But one team of Googlers and academic researchers has stepped back from that cycle to take a broader view of the maelstrom of scams, fraud and theft online.
If you look to the photo-ops of Chinese President Xi and Barack Obama, you won’t see any generals by Xi’s side. But China’s military leaders played a major role in drafting the script President Xi is following as he visits Washington, D.C. this week.
An Obama administration working group has explored four possible approaches tech companies might use that would allow law enforcement to unlock encrypted communications — access that some tech firms say their systems are not set up to provide.
Bad guys very willing to invest in attacking medical data, but healthcare not very willing to invest in defending it.
The number of people applying for or receiving security clearances whose fingerprint images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personnel Management announced Wednesday.
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) today announced it will award nearly $3.7 million for three pilot projects designed to make online transactions more secure and privacy-enhancing for healthcare, government services, transportation and the Internet of Things.
An alleged pattern of forensic failures at Illinois State Police crime labs could put criminal cases in jeopardy and risk thousands of charges and convictions being thrown out.
In Afghanistan from 2012 to 2015, 21,000 cases were processed by this mobile forensic lab leading to over 30,000 DNA and 56,000 latent print profiles added to database and 12,000 DNA matches and 6,000 latent print identifications.
The breadth of the Volkswagen scandal should not obscure the broader question of how vulnerable we are to software code that is out of sight and beyond oversight.
A recently discovered attack on visitors of the 8chan image website went well beyond the venue's usual script-kiddie fare by combining two weaknesses on that property with a potentially catastrophic vulnerability on the wildly popular photo-sharing site Imgur.com.
The Federal Bureau of Investigation’s success at salvaging personal e-mails that Clinton said had been deleted raises the possibility that the Democratic presidential candidate’s correspondence eventually could become public. The disclosure of such e-mails would likely fan the controversy over Clinton’s use of a private e-mail system for official business.
Our military, governments, hospitals and financial institutions handle massive amounts of sensitive data. This data is often shared across networks and computers. How do we consistently protect such information, especially when technology is constantly evolving? To address this question, the Global Security Initiative at Arizona State University has launched the Center for Cybersecurity and Digital Forensics.