Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.

Centuries-Old DNA Helps Identify Origins of Caribbean Slave Skeletons

March 12, 2015 9:53 am | by Krista Conger, Stanford University | Comments

A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.  

TOPICS:
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpe

Software Spots Online Child Sex Abuse

March 12, 2015 9:27 am | by Tilburg University | Comments

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.

TOPICS:
The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.

Politics Intrude as Cybersecurity Firms Hunt Foreign Spies

March 12, 2015 8:35 am | by Joseph Menn, Reuters | Comments

The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.

TOPICS:
Advertisement
The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.

Imprint of License Plate in Snow Leads to Burglary Suspects

March 11, 2015 11:36 am | by Associated Press | Comments

The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.

TOPICS:
A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.

Stolen Data Worth Less Over Time

March 11, 2015 11:10 am | by INFORMS | Comments

A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.

TOPICS:
Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago t

Mexican Town Where 43 Students Disappeared is Opium Hotbed

March 11, 2015 9:53 am | by Christopher Sherman and Alberto Arce, Associated Press | Comments

Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago to replace the city's police force have had no effects on the killings and kidnappings. The violence continues because Iguala's most lucrative business still thrives: the opium trade.

TOPICS:
Cryptography Services, a team of consultants from several security research firms,   have announced that they have been tasked with auditing OpenSSL, the popular and   widely used open-source implementation of the SSL and TLS protocols.

Core Infrastructure Initiative Kickstarts OpenSSL Audit

March 11, 2015 9:44 am | by Zeljka Zorn, Help Net Security | Comments

Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used open-source implementation of the SSL and TLS protocols.

TOPICS:
Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack.

Boston Bombing Jury Sees Suspect's Bullet-Ridden Notes

March 11, 2015 8:35 am | by Denise LaVoie, Associated Press | Comments

Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack. 

TOPICS:
Advertisement
The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown,

Forensic Anthropologist Helps Police Identify Old Bones

March 11, 2015 8:35 am | by Matt McKinney, Star Tribune | Comments

The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown, the people who once animated those bones somehow went unaccounted for. It’s Myster’s job to figure out who they were.

TOPICS:
In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.

Cutting-Edge Hack Exploits DRAM Weakness

March 11, 2015 8:34 am | by Dan Goodin, Ars Technica | Comments

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.

TOPICS:
At least 2,000 years before the ancient Egyptians began mummifying their pharaohs, a hunter-gatherer people called the Chinchorro living along the coast of modern-day Chile and Peru developed elaborate methods to mummify not just elites but the ordinary a

Case of the Rotting Mummies

March 10, 2015 11:10 am | by Paul Karoff, Harvard University | Comments

At least 2,000 years before the ancient Egyptians began mummifying their pharaohs, a hunter-gatherer people called the Chinchorro living along the coast of modern-day Chile and Peru developed elaborate methods to mummify not just elites but the ordinary as well. But after staying remarkably well-preserved for millennia, in the past decade many of the Chinchorro mummies have begun to rapidly degrade.

TOPICS:
The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to make the majority of the members of its Cyber Mission Force (CMF) achieve at least

Pentagon Wants 3000 Cyber Professionals

March 10, 2015 10:30 am | by Zeljka Zorn, Help Net Security | Comments

The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to make the majority of the members of its Cyber Mission Force (CMF) achieve at least initial operational capability by the end of the 2016 Fiscal Year.

TOPICS:
Users of an email service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials have said.

German Government Backs End-to-End Encryption for Email

March 10, 2015 10:17 am | by Frank Jordans, Associated Press | Comments

Users of an email service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials have said.

TOPICS:
Apple has unveiled the Apple Watch — a smart wearable that will function as a Mac-on-the-wrist. It has tech-heads excited, but security researchers warn that consumers should be careful of the potential cyber risks that the gadget’s on-board connectivity

Cyber Risk May Take a Bite Out of Apple Watch

March 10, 2015 10:07 am | by Tara Seals, Infosecurity Magazine | Comments

Apple has unveiled the Apple Watch — a smart wearable that will function as a Mac-on-the-wrist. It has tech-heads excited, but security researchers warn that consumers should be careful of the potential cyber risks that the gadget’s on-board connectivity represents.

TOPICS:
CIA researchers have worked for nearly a decade to break the security protecting Apple phones and tablets, investigative news site The Intercept has reported, citing documents obtained from NSA whistleblower Edward Snowden.

CIA Tries to Hack Apple

March 10, 2015 9:44 am | by Reuters | Comments

CIA researchers have worked for nearly a decade to break the security protecting Apple phones and tablets, investigative news site The Intercept has reported, citing documents obtained from NSA whistleblower Edward Snowden.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading