A newly developed genetic technique enabled researchers to sequence DNA from the teeth of 300-year-old skeletons, helping to pinpoint where in Africa three slaves had likely lived before being captured.
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.
The $71 billion cybersecurity industry is fragmenting along geopolitical lines as firms chase after government contracts, share information with spy agencies, and market themselves as protectors against attacks by other nations.
The imprint of a license plate in a snowbank proved to be the undoing of a couple suspected of a series of burglaries in Massachusetts.
A new model examining cyber crimes adds an important way of examining the perishable value of stolen data so policy makers can plan against future hacks like the recent Anthem data breach, according to a study.
Bloodshed was part of life in Iguala, Mexico before local police allegedly disappeared 43 college students in September, and it remains so now. Despite federal efforts to wrest control, the 600 federal officers and 1,000 soldiers sent in five months ago to replace the city's police force have had no effects on the killings and kidnappings. The violence continues because Iguala's most lucrative business still thrives: the opium trade.
Cryptography Services, a team of consultants from several security research firms, have announced that they have been tasked with auditing OpenSSL, the popular and widely used open-source implementation of the SSL and TLS protocols.
Jurors in the trial of Boston Marathon bomber Dzhokhar Tsarnaev on Tuesday saw photographs of a blood-stained, hand-scrawled note speckled with bullet holes inside the boat he was captured in days after the deadly 2013 attack.
The bones that end up with forensic anthropologist Sue Myster come from the strangest places: construction projects, disturbed grave sites, long-hidden crime scenes. From medical samples carelessly thrown out in the woods. Long dead, unnamed and unknown, the people who once animated those bones somehow went unaccounted for. It’s Myster’s job to figure out who they were.
In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.
At least 2,000 years before the ancient Egyptians began mummifying their pharaohs, a hunter-gatherer people called the Chinchorro living along the coast of modern-day Chile and Peru developed elaborate methods to mummify not just elites but the ordinary as well. But after staying remarkably well-preserved for millennia, in the past decade many of the Chinchorro mummies have begun to rapidly degrade.
The US Department of Defense has gotten permission and is aiming to hire 3,000 infosec professionals to work at the US Cyber Command by the end of this year, and is set to make the majority of the members of its Cyber Mission Force (CMF) achieve at least initial operational capability by the end of the 2016 Fiscal Year.
Users of an email service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials have said.
Apple has unveiled the Apple Watch — a smart wearable that will function as a Mac-on-the-wrist. It has tech-heads excited, but security researchers warn that consumers should be careful of the potential cyber risks that the gadget’s on-board connectivity represents.
CIA researchers have worked for nearly a decade to break the security protecting Apple phones and tablets, investigative news site The Intercept has reported, citing documents obtained from NSA whistleblower Edward Snowden.