Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

USA TODAY has reported that the U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the f

DEA Collected American Call Data for Years

April 10, 2015 11:42 am | by Brad Heath, USA TODAY | Comments

USA TODAY has reported that the U.S. government started keeping secret records of Americans' international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.

TOPICS:
French TV broadcaster TV5Monde has suffered a major cyber-attack on its systems by pro-ISIS hackers which caused a broadcasting blackout for several hours and hijacked its social media pages and website.

French TV Network TV5Monde Shunted Off Air by Pro-ISIS Hackers

April 10, 2015 10:27 am | by Phil Muncaster, Infosecurity Magazine | Comments

French TV broadcaster TV5Monde has suffered a major cyber-attack on its systems by pro-ISIS hackers which caused a broadcasting blackout for several hours and hijacked its social media pages and website.

TOPICS:
A new strain of ransomware has been broken, allowing for victims to circumvent payment and access their locked data.

Ransomware Strain Breaks, Victims Avoid Payment

April 10, 2015 9:42 am | by Charlie Osborne, ZD Net | Comments

A new strain of ransomware has been broken, allowing for victims to circumvent payment and access their locked data.

TOPICS:
Advertisement
Lawyers hired by the family of a black man who was found hanging in Mississippi said Wednesday that they are hiring independent experts, including a high-profile forensic pathologist, to conduct an investigation separate from the one pursued by state and

Family of Man Found Hanging in Mississippi Hiring Forensic Experts

April 9, 2015 1:59 pm | by Emily Wagster Pettus, Associated Press | Comments

Lawyers hired by the family of a black man who was found hanging in Mississippi said Wednesday that they are hiring independent experts, including a high-profile forensic pathologist, to conduct an investigation separate from the one pursued by state and federal authorities.

TOPICS:
The intent of this study was to measure consensus, not whether the analysts were actually correct in their conclusions. This reflects an ugly reality about the pattern-matching fields of forensics: Because they’re so subjective, it isn’t difficult for att

Bite Mark Matching Advocacy Group Conducted a Study That Discredits Bite Mark Evidence

April 9, 2015 12:36 pm | by Radley Balko, The Washington Post | Comments

The intent of this study was to measure consensus, not whether the analysts were actually correct in their conclusions. This reflects an ugly reality about the pattern-matching fields of forensics: Because they’re so subjective, it isn’t difficult for attorneys on either side of a case to find an expert who will testify to the conclusion they’re looking for.

TOPICS:
The FBI’s Criminal Justice Information Services (CJIS) Division took biometric identification to the next level when the Next Generation Identification (NGI) System — now the FBI’s largest information technology system — became fully operational.

FBI's Next Generation Identification is Fully Operational

April 9, 2015 12:00 pm | by C. Michael Riley, FBI | Comments

The FBI’s Criminal Justice Information Services (CJIS) Division took biometric identification to the next level when the Next Generation Identification (NGI) System — now the FBI’s largest information technology system — became fully operational.

TOPICS:
Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite e

Russians Still Hacking the White House

April 9, 2015 11:25 am | by Ernie Austin, Associate Editor | Comments

Russian Hackers used a phishing email sent to the State Department as a jumping off point to infiltrate White House systems. Non-classified, but sensitive, data was taken. The hackers have also been able to reenter the State Department's system, despite efforts to keep them out.

TOPICS:
Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.

Police Pay Ransom After Network Cyber Attack

April 9, 2015 11:02 am | by Jayne W. Miller. Tewksbury Town Crier | Comments

Last December, Police in Massachusetts confronted a new, and growing, frontier in cyber terrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting essential department files until the town paid a $500 bitcoin ransom.

TOPICS:
Advertisement
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.

Cybercrime Fighting Group Takes Down Beebone Botnet

April 9, 2015 10:44 am | by Raphael Satter, Associated Press | Comments

A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.

TOPICS:
Malware-as-a-service trend has effectively democratized the means for hackers of all skill levels to launch damaging attacks, with cyber criminals blending cutting edge tools with tried-and-tested techniques.

Attackers Blend New With Old to Foil Corporate Defenses

April 9, 2015 10:28 am | by Phil Muncaster, Infosecurity Magazine | Comments

Malware-as-a-service trend has effectively democratized the means for hackers of all skill levels to launch damaging attacks, with cyber criminals blending cutting edge tools with tried-and-tested techniques.

TOPICS:
Ransomware is one of the fastest-growing forms of hacking, cybersecurity experts say. Anyone from a home computer user to a Fortune 500 company can be infected. It can also attack smartphones. The smaller the users, the more vulnerable they are to losing

Computer Users Face Ransomware's Choice

April 9, 2015 8:40 am | by Joyce M. Rosenberg, Associated Press | Comments

Ransomware is one of the fastest-growing forms of hacking, cybersecurity experts say. Anyone from a home computer user to a Fortune 500 company can be infected. It can also attack smartphones. The smaller the users, the more vulnerable they are to losing their files — unless they have a secure backup for their system or go through the complicated process of paying cyber criminals.

TOPICS:
Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's sta

Dzhokhar Tsarnaev Convicted in Boston Marathon Bombing

April 8, 2015 2:44 pm | by Denise LaVoie, Associated Press | Comments

Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's startling admission during opening statements that Tsarnaev carried out the attack with his now-dead older brother, Tamerlan.

TOPICS:
London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

UK Police Report Robbery of Safety Boxes in Jewelry District

April 8, 2015 12:34 pm | by The Associated Press | Comments

London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

TOPICS:
RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top securi

Most Organizations Not Prepared to Respond to a Breach

April 8, 2015 11:33 am | by EMC | Comments

RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top security leaders from the Global 1000.

TOPICS:
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

Diving Into the Dark Web: Where does stolen data go?

April 8, 2015 11:02 am | by Charlie Osborne, ZD Net | Comments

When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading