Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

New Domains Revitalize Phishing Campaigns

May 14, 2015 9:56 am | by Charlie Osborne, ZDNet | Comments

Top-level domains are becoming a favorite tool of cyber criminals looking to promote unwanted, fraudulent advertising and phishing campaigns.

TOPICS:
Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University

New KBI Crime Lab Called Needed Investment in Public Safety

May 13, 2015 2:35 pm | by Melissa Brunner, WIBW.com | Comments

Their current test firing range was crafted in a hallway and cold storage for evidence is a collection assembled from the local Sears. The Kansas Bureau of Investigation says a $55 million crime lab taking shape on the east side of the Washburn University campus is long overdue.

TOPICS:
The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is vol

One of NJ's Largest Medical Examiner Offices Failed Accreditation, But Does It Matter?

May 13, 2015 2:18 pm | by Justin Zaremba, NJ.com | Comments

The regional medical examiner office that performed the autopsies of the high-profile death investigation of John and Joyce Sheridan, whose deaths were ruled a murder-suicide, failed its re-accreditation two years ago. But the accreditation process is voluntary, and most medical examiner offices throughout the country operate without accreditation.

TOPICS:
Advertisement
Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in

Romania Helps Ukraine Fight Russian Hacking

May 13, 2015 1:44 pm | by Alizon Mutler, Associated Press | Comments

Ukraine is turning to an unlikely partner in its struggle to defend itself against Russian cyber warfare: Romania. The eastern European country known more for economic disarray than technological prowess has become one of the leading nations in Europe in the fight against hacking.

TOPICS:
Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

VENOM Zero-Day May Affect Thousands Of Cloud, Virtualization Products

May 13, 2015 1:30 pm | by Sara Peters, Dark Reading | Comments

Critical vulnerability in the open-source QEMU hypervisor lets attackers break out of a virtual machine, execute code on a host machine and access all the other VMs on the host.

TOPICS:
Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables crimina

Why So Much Cime is Cyber-Enabled

May 13, 2015 1:14 pm | by Mathew J. Schwartz, Gov Info Security | Comments

Forget notions that physical crime today somehow operates in a separate sphere from cybercrime. That's because many criminals have become experts at embracing online attack techniques, thanks in part to a thriving cybercrime ecosystem that enables criminals to hire specialists with skills or acquire attack tools on an as-needed basis.

TOPICS:
A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

DDoS Botnet Makes Slaves of Home and Office Routers

May 13, 2015 12:59 pm | by Charlie Osborne, ZD Net | Comments

A massive DDoS botnet made up of a slave network of hijacked home and office routers has been revealed.

TOPICS:
Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

Scammers Draining Payment Cards Linked to Starbucks Card Accounts

May 13, 2015 12:51 pm | by Zeljka Zorz, Help Net Security | Comments

Scammers are actively targeting Starbucks customers and syphoning money from the credit or debit card they have tied to their Starbucks accounts.

TOPICS:
Advertisement
The Internal Revenue Service’s Criminal Investigation division has created a cybercrime unit to combat the growing trend of identity theft-related tax fraud as the problem morphs into data breaches and becomes more international in scope.

IRS Creates Cybercrime Unit to Battle Identity Theft

May 12, 2015 1:48 pm | by Michael Cohn, Accounting Today | Comments

The Internal Revenue Service’s Criminal Investigation division has created a cybercrime unit to combat the growing trend of identity theft-related tax fraud as the problem morphs into data breaches and becomes more international in scope.

TOPICS:
Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Department hopes to overcome.

Employing Technology to Ensure Privacy

May 12, 2015 1:27 pm | by Eric Chabrow, Gov Info Security | Comments

Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Department hopes to overcome.

TOPICS:
Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund conference held last week in Las Vegas.

Cyber Extortionists are Hitting Hedge Funds

May 12, 2015 1:13 pm | by Zeljka Zorz, Help Net Security | Comments

Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund conference held last week in Las Vegas.

TOPICS:
As fighters surged into Syria last summer, a video surfaced online with the grisly imagery and sneering tone of a propaganda release from the Islamic State. The clip was assembled by a special unit at the State Department charged with finding ways to cont

US Imitates Enemy in Social Media Propaganda War Against ISIS

May 12, 2015 1:02 pm | by Greg Miller and Scott Higham, The Washington Post | Comments

As fighters surged into Syria last summer, a video surfaced online with the grisly imagery and sneering tone of a propaganda release from the Islamic State. The clip was assembled by a special unit at the State Department charged with finding ways to contain the spread of militant Islamist ideology, The Center for Strategic Counterterrorism Communications.

TOPICS:

M-Vac is Sucking Up DNA Evidence Needed to Catch Criminals

May 12, 2015 12:30 pm | by Sandra Olney, KSL | Comments

Like a mini carpet cleaner, the M-Vac system sucks up DNA evidence from a variety of broad porous surfaces like a cotton shirt.

TOPICS:
British spy agency GCHQ is for the first time openly hiring hackers.

UK Spy Agency Openly Hiring Hackers

May 12, 2015 12:27 pm | by Zack Whittaker, ZDNet | Comments

British spy agency GCHQ is for the first time openly hiring hackers.

TOPICS:

Atlanta Police Get New Crime Lab

May 12, 2015 12:03 pm | by Morse Diggs, Fox 5 | Comments

A murder at a popular Atlanta bar stymied investigators for months. Using crime scene investigative tools, detectives quickly got the ballistics information they needed and were able to make an arrest.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading