Subscribe to Forensic Magazine
View Sample

Forensic Magazine

Businesses Face Malicious Attachment Threat As Spam Declines

August 14, 2015 1:25 pm | by Tom Jowitt, Tech Week | Comments

The good news is that the volume of unsolicited email has declined to levels not seen since since 2012. The EU incidentally is the largest generator (15 percent) of total unsolicited emails, followed by the USA, China, Russia and even Indonesia and Argentina.


How to Overcome Digital Forensic Challenges in the Cloud

August 14, 2015 1:20 pm | by Hamid Jahankhani, Tech Week | Comments

Cloud computing services are also, a popular target for malicious activities, resulting in the exponential increase of cyber attacks. Digital evidence is the evidence that is collected from the suspect’s workstations or electronic medium that could be used to assist computer forensics investigations.


Attackers are Hijacking Critical Networking Gear from Cisco, Company Warns

August 14, 2015 1:15 pm | by Dan Goodin, Ars Technica | Comments

Short for ROM Monitor, ROMMON is the means for booting Cisco's IOS operating system. Administrators use it to perform a variety of configuration tasks, including recovering lost passwords, downloading software, or in some cases running the router itself.


Top Secret Clinton Emails Include Drone Talk

August 14, 2015 1:10 pm | by Bradley Klapper, The Associated Press | Comments

The two emails on Hillary Rodham Clinton's private server that an auditor deemed "top secret" include a discussion of a news article detailing a U.S. drone operation and a separate conversation that could point back to highly classified material.


1982 Murder Conviction Thrown Out on New DNA Evidence

August 13, 2015 4:11 pm | by David DeKok, Reuters | Comments

DNA testing of sperm evidence in the case "excluded Fogle and pointed to an unidentified male" in the 1976 rape and murder of Deann "Kathy" Long, according to the Innocence Project, a group that works to exonerate wrongfully convicted people.


Should Cops Get to Review the Video Before They Report?

August 13, 2015 11:34 am | by Kathy Pezdek, The Marshall Project | Comments

The question is whether prior to being questioned or even prior to writing a report, should the officer be permitted to view the recorded footage? 


Samsung Unveils 2.5-inch 16TB SSD: The World’s Largest Hard Drive

August 13, 2015 10:47 am | by Sebastian Anthony, Ars Technica | Comments

The secret sauce behind Samsung's 16TB SSD is the company's new 256Gbit (32GB) NAND flash die; twice the capacity of 128Gbit NAND dies that were commercialised by various chip makers last year.


Cyber Security Startup Tanium at $2.5 billion Valuation

August 13, 2015 10:42 am | by Leena Rao and Dan Primack, Fortune | Comments

What makes Tanium unique is its ability to detect and fix enterprise security threats quickly. The company’s technology works across traditional computing infrastructure and systems that make up the Internet of things.


6 Observations About Cybersecurity Based On Two New Surveys

August 13, 2015 10:31 am | by Gil Press, Forbes | Comments

​Cybersecurity incidents and attacks have become almost daily news, and two new surveys give voice to the executives and cybersecurity professionals struggling to defend their organizations.


Police Investigate First 'Cyber-Flashing' Case

August 13, 2015 10:21 am | by Sarah Bell, BBC | Comments

Police are investigating a "new" crime of cyber-flashing after a commuter received an indecent image on her phone as she traveled to work. The victim received two pictures of an unknown man's penis on her phone via Apple's Airdrop sharing function.


How to Go from Hunted to Hunter

August 13, 2015 10:06 am | by Ashish Patel, Info-security Magazine | Comments

Following a cyber-attack, it’s only natural that a company would wish to work out retrospectively what went wrong and why. But, if we are to truly target hackers head on, we need to act on the offensive – not the defensive.


Fate of Roanoke, Lost Colony and First American Mystery, Has New Lead

August 12, 2015 2:53 pm | by Seth Augenstein, Digital Reporter | Comments

The fate of Roanoke is the first, and most enduring, American mystery. But the recent discovery of hidden information on a centuries-old map has generated the latest lead in the ongoing investigation.


N.C. Expands Toxicology Testing to Ease DWI Backlog

August 12, 2015 2:00 pm | by Sabian Warren, Citizen-Times | Comments

A state crime lab in Asheville, N.C. is expanding to include blood toxicology services, which is expected to help ease a crushing backlog of DWI cases statewide. The local lab up to this point has not conducted blood toxicology testing for alcohol or drugs, instead focusing on testing of firearms, fingerprints and other evidence.


Holdout Michigan Considers Compensating Innocent Inmates

August 12, 2015 1:43 pm | by David Eggert, Associated Press | Comments

One newly exonerated inmate walks free every couple of months in Michigan, which has released more innocent prisoners than all but four states. Yet Michigan, unlike 30 other states that have provided the wrongfully convicted with financial support, is just beginning to seriously confront the issue after years of stalled efforts and a prolonged economic downturn.


Headmaster's Attorney Argues Witness Tampering, Via Computer Forensics

August 12, 2015 1:39 pm | by Randall Chase, Associated Press | Comments

The former headmaster of an elite Delaware prep school founded by members of the du Pont family is challenging his child pornography conviction in court papers filed Monday. Wheeler's attorney, Thomas Foley, argues that authorities used possible witness tampering as a pretext to obtain warrants to search Wheeler's computers.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.