Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's sta

Dzhokhar Tsarnaev Convicted in Boston Marathon Bombing

April 8, 2015 2:44 pm | by Denise LaVoie, Associated Press | Comments

Dzhokhar Tsarnaev was convicted Wednesday in the Boston Marathon bombing by a federal jury that now must decide whether the 21-year-old former college student should be executed. His conviction was practically a foregone conclusion, given his lawyer's startling admission during opening statements that Tsarnaev carried out the attack with his now-dead older brother, Tamerlan.

TOPICS:
London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

UK Police Report Robbery of Safety Boxes in Jewelry District

April 8, 2015 12:34 pm | by The Associated Press | Comments

London police say heavy cutting equipment has been used to break into a vault containing safety deposit boxes in the Hatton Garden jewelry district.

TOPICS:
RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top securi

Most Organizations Not Prepared to Respond to a Breach

April 8, 2015 11:33 am | by EMC | Comments

RSA, The Security Division of EMC, has released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey of the Security for Business Innovation Council (SBIC), a group of top security leaders from the Global 1000.

TOPICS:
Advertisement
When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

Diving Into the Dark Web: Where does stolen data go?

April 8, 2015 11:02 am | by Charlie Osborne, ZD Net | Comments

When a data breach occurs and personal information is stolen, where does it end up? Bitglass researchers decided to find out.

TOPICS:
Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hack

Bitcoin Flaws Beckon Hackers

April 8, 2015 10:49 am | by Tara Seals, Infosecurity Magazine | Comments

Digital currencies are an increasingly important aspect of e-commerce and other transactional arenas. But be aware: Bitcoin, and other cryptocurrencies based on blockchain technology, have a few flaws that could open them up for abuse by enterprising hackers.

TOPICS:
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.

Cyber War Games: Top 3 Lessons Learned about Incident Response

April 8, 2015 10:31 am | by Sara Peters, Dark Reading | Comments

Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.

TOPICS:
The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.

Pro-ISIS Script Kiddies Exploiting WordPress Sites, FBI Warns

April 8, 2015 10:10 am | by Dan Goodin, Ars Technica | Comments

The FBI is advising people responsible for WordPress websites to be on the lookout for attacks carried out by individuals sympathetic to the Islamic State of Iraq and al-Shams terrorist group, which is also known as the Islamic State in the Levant.

TOPICS:
DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One li

Pointing the Finger at the Right Identical Twin Just Got Easier

April 8, 2015 9:21 am | by Graham Williams, The Convesation | Comments

DNA profiling (or genetic fingerprinting) has proved a revolutionary tool for forensic investigators as a means to identify potential suspects, exonerate the innocent and convict the guilty. But, like any forensic technique, it has its limitations. One limitation is in cases involving identical twins, something that has raised technical, legal and ethical problems – until now.  

TOPICS:
Advertisement
The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — tak

Local, Federal Police Turn to University for Cyber Forensics Help

April 7, 2015 3:56 pm | by Dash Coleman, Savannah Morning News | Comments

The list of active cases at the cyber forensics lab at Armstrong State University’s police department is more representative of surrounding Savannah than the sleepy campus. That’s because other law enforcement agencies — from local police to the FBI — take advantage of something Armstrong’s officers have in abundance: time and cyber crime expertise.

TOPICS:
In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics ev

Police Testing Spent Shell Casings Faster to Solve Gun Crime

April 7, 2015 3:44 pm | by Sadie Gurman, Associated Press | Comments

In many U.S. police departments, ballistic evidence might be shelved in an overworked crime lab, where analysts would only run it through the database to prepare a case for trial. But authorities in Denver are leading a national trend to put ballistics evidence into the hands of investigators much more quickly — before leads dry up and suspects disappear.

TOPICS:
Recently, Anthony Hinton became the 152nd death-row prisoner to be exonerated since 1973. Like most people who’ve been exonerated to date, Hinton didn’t rely on new DNA evidence to prove him innocent.

Better Forensics Aren't Enough to Prevent Wrongful Death Sentences

April 7, 2015 2:26 pm | by Leah Libresco, FiveThirtyEight | Comments

Recently, Anthony Hinton became the 152nd death-row prisoner to be exonerated since 1973. Like most people who’ve been exonerated to date, Hinton didn’t rely on new DNA evidence to prove him innocent.

TOPICS:
A new report describes findings about unsubmitted sexual assault kits in Wayne County (Detroit), Michigan. A multidisciplinary team investigated the situation and found a number of effective and sustainable responses and ways to prevent the problem from r

Responding to Unsubmitted Sexual Assault Kits

April 7, 2015 1:51 pm | by Rebecca Campbell, NIJ | Comments

A new report describes findings about unsubmitted sexual assault kits in Wayne County (Detroit), Michigan. A multidisciplinary team investigated the situation and found a number of effective and sustainable responses and ways to prevent the problem from recurring.

TOPICS:
Iraqi forensic teams in the newly recaptured city of Tikrit have started exhuming bodies from mass graves believed to contain some of the hundreds of soldiers killed by Islamic State militants last year, a government spokesman said Tuesday.

Iraqi Forensic Teams Start Exhuming Mass Grave of Soldiers

April 7, 2015 1:27 pm | by Sinan Salaheddin, Associated Press | Comments

Iraqi forensic teams in the newly recaptured city of Tikrit have started exhuming bodies from mass graves believed to contain some of the hundreds of soldiers killed by Islamic State militants last year, a government spokesman said Tuesday.

TOPICS:
The tech community has long called for reforming the 1986 Computer Fraud and Abuse Act for its overly broad language. But now many worry a White House plan to toughen the law will have a chilling effect on work to expose software weaknesses.

Why Cyber Pros Don't Like Proposal for Antihacking Law

April 7, 2015 12:25 pm | by Fahmida Rashid, Passcode | Comments

The tech community has long called for reforming the 1986 Computer Fraud and Abuse Act for its overly broad language. But now many worry a White House plan to toughen the law will have a chilling effect on work to expose software weaknesses.

TOPICS:
On the second floor of a narrow brick building in the London Borough of Islington, Edin Omanovic is busy creating a fake company. He is playing with the invented company’s business cards in a graphic design program, darkening the reds, bolding the blacks,

Meet the Privacy Activists Who Spy on the Surveillance Industry

April 7, 2015 12:01 pm | by Daniel Rivero, Fusion | Comments

On the second floor of a narrow brick building in the London Borough of Islington, Edin Omanovic is busy creating a fake company. He is playing with the invented company’s business cards in a graphic design program, darkening the reds, bolding the blacks, and testing fonts to strike the right tone: informational, ambiguous, no bells and whistles. In a separate window, a barren website is starting to take shape.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading