Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Android and iOS mobile apps are still vulnerable to the recent FREAK attacks. Patching browsers may have made them safe, but FireEye has reported that the Android and iOS platforms and apps are still open to encryption manipulations.

Mobile Phones are FREAKing Out

March 18, 2015 10:13 am | by Ernie Austin, Associate Editor | Comments

Android and iOS mobile apps are still vulnerable to the recent FREAK attacks. Patching browsers may have made them safe, but FireEye has reported that the Android and iOS platforms and apps are still open to encryption manipulations.  

TOPICS:
A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users.

Deanonymizing Tor Users With Raptor Attacks

March 18, 2015 8:31 am | by Zeljka Zorn, Help Net Security | Comments

A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users.

TOPICS:
New and subtle business models are emerging for cyber criminals, boosting their sales of stolen data and offering new ways to inflict damage on target organizations.

Cyber Criminals ​Boost Sales Through 'Data Laundering'

March 18, 2015 8:30 am | Comments

New and subtle business models are emerging for cyber criminals, boosting their sales of stolen data and offering new ways to inflict damage on target organizations.

TOPICS:
Advertisement
Most Americans have not altered their online behavior since the revelations almost two years ago by former National Security Agency contractor Edward Snowden, according to a survey by the Pew Research Center.

Survey Says Americans in Privacy Denial After Snowden

March 17, 2015 11:54 am | by Ernie Austin, Associate Editor | Comments

Most Americans have not altered their online behavior since the revelations almost two years ago by former National Security Agency contractor Edward Snowden, according to a survey by the Pew Research Center.

TOPICS:

Bill Would Require Post-Conviction Preservation of DNA

March 17, 2015 10:43 am | by Rachel La Corte, Associated Press | Comments

A bill that has passed the House and is awaiting action in the Senate would require DNA collected in any felony case charged as a violent or sex offense to be preserved through the length of the offender's sentence, including post-prison community custody.

TOPICS:

Cyber CSI: The Challenges of Digital Forensics

March 17, 2015 10:31 am | by Richard Boddington | Comments

Broadly speaking, digital evidence is information found on a wide range of electronic devices that is useful in court because of its probative value. It’s like the digital equivalent of a fingerprint or a muddy boot.

TOPICS:

Living Relatives Needed to Help Identify Bodies in Mass Grave

March 17, 2015 10:19 am | by Kamcilla Pillay, Daily News | Comments

DNA testing could help identify the bodies found in mass graves on a KwaZulu-Natal farm in South Africa - but only if living relatives came forward for tissue samples to be compared, said a genetics expert.

TOPICS:

DNA Identifies Missing WWI Soldier

March 17, 2015 10:09 am | by Elizabeth Henson, The Daily Telegraph | Comments

​Shiralee Reardon can only imagine the courage it must have taken for her great uncle to fight and die in the bloodiest 24 hours in Australian history. Corigliano was among the more than 5500 Australian soldiers killed, wounded or taken prisoner on the night of July 19-20, 1916.

TOPICS:
Advertisement
Forty-two amateur cyber defenders gathered on the HMS Belfast in London recently to take part in a cyber terrorist attack simulation run by the Cyber Security Challenge UK.

Cyber War Staged in Central London

March 17, 2015 8:24 am | by Emiko Jozuka, Ars Technica | Comments

Forty-two amateur cyber defenders gathered on the HMS Belfast in London recently to take part in a cyberterrorist attack simulation run by the Cyber Security Challenge UK.

TOPICS:
The name suggests a parade of a C-list websites. There was NewJunk4U.com and Monster-Ads.net, CoffeeHausBlog.com and SuddenPlot.com. But, these sad-sounding domains actually were artful creations of the National Security Agency: They were fronts for distr

Psssst: Wanna Buy a Used Spy Website?

March 16, 2015 10:53 am | by Kevin Poulsen, Wired | Comments

The name suggests a parade of a C-list websites. There was NewJunk4U.com and Monster-Ads.net, CoffeeHausBlog.com and SuddenPlot.com. But, these sad-sounding domains actually were artful creations of the National Security Agency: They were fronts for distributing and controlling government malware around the world.

TOPICS:

Prominent Forensic Expert to Help Probe Taiwan Prison Hostage Case

March 16, 2015 10:33 am | by Tsai Pei-chi and Christie Chen | Comments

Kaohsiung authorities have asked renowned forensic scientist Henry Lee to assist with the investigation of a prison hostage crisis in the city last month that ended with the six hostage takers, all inmates, committing suicide.

TOPICS:

Biden in Md. to Discuss Funds for Rape Kit Testing

March 16, 2015 10:19 am | by Associated Press | Comments

Vice President Joe Biden will join Senator Barbara Mikulski on Monday in Pikesville to highlight funding directed toward clearing a backlog of hundreds of thousands of untested rape kits.

TOPICS:

Modern Forensic Science: Solving The Oldest And Coldest Cases

March 16, 2015 10:03 am | by Jared Stern | Comments

Modern forensic science is useful for investigators as a means of solving the most complex crimes. But, new research unlocks the mysteries of the life and death of historical figures like King Richard III and the curious case of Cangrande I della Scala. 

TOPICS:
Mozilla, which operates thousands of servers to build products and run services for its users, has developed and launched Masche, a forensics tool for examining the memory of running processes. It’s a need that often arises during security investigations.

Mozilla Releases Masche Forensics Module

March 16, 2015 9:54 am | by Tara Seals, Infosecurity Magazine | Comments

Mozilla, which operates thousands of servers to build products and run services for its users, has developed and launched Masche, a forensics tool for examining the memory of running processes. It’s a need that often arises during security investigations.

TOPICS:

Retired FBI Agent Alleges Sabotaged Crime Scene in 'Speed Freak Killers' Case

March 16, 2015 9:50 am | by Matthias Gafni | Comments

In the latest explosive allegation against the San Joaquin County Sheriff's Office, a federal agent assisting with the notorious "Speed Freak Killers" case has accused the agency of sabotaging crime scenes to cover up the purported destruction of missing persons files.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading