Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

The latest bug in OpenSSL patched on Thursday is nowhere near as bad as Heartbleed and shows the open source community is getting better at spotting and addressing flaws, according to industry experts.

Latest OpenSSL Flaw Not a Heartbleed-Sized Bug

July 10, 2015 11:19 am | by Phil Muncaster, Infosecurity Magazine | Comments

The latest bug in OpenSSL patched on Thursday is nowhere near as bad as Heartbleed and shows the open source community is getting better at spotting and addressing flaws, according to industry experts.

TOPICS:
The EWG Action Fund is calling for a ban on asbestos in consumer products after it found traces of the carcinogen in children's crayons and toy crime lab kits.

Group Finds Asbestos in Children's Crayons, Toy Crime Lab Kits

July 9, 2015 2:57 pm | by Liza Lucas, CNN | Comments

The EWG Action Fund is calling for a ban on asbestos in consumer products after it found traces of the carcinogen in children's crayons and toy crime lab kits.

TOPICS:
A forensic dentist from Australiais on a mission to help identify victims of fatal burn injuries, developing a new product that dramatically reduces the time it takes to identify burn victims.

Glue Spray Helps Identify Burn Victims

July 9, 2015 2:36 pm | by University of Adelaide | Comments

A forensic dentist from Australia is on a mission to help identify victims of fatal burn injuries, developing a new product that dramatically reduces the time it takes to identify burn victims.

TOPICS:
Advertisement
Massively parallel sequencing (MPS) is an exciting technology that could enhance the capabilities of forensic DNA analysts. But there are several challenges to implementing an MPS system in a crime laboratory.

NIJ Webinar: Using Bioinformatics in DNA Analysis

July 9, 2015 12:53 pm | by NIJ | Comments

Massively parallel sequencing (MPS) is an exciting technology that could enhance the capabilities of forensic DNA analysts. But there are several challenges to implementing an MPS system in a crime laboratory.

Beware a surge in the number of ZeusVM Banking Trojan-based botnets operating in the wild, since the tools for building and customizing the cybercrime malware are now available for free.

ZeusVM Leak Means Botnet Surge

July 9, 2015 12:05 pm | by Varun Haran, Gov Info Security | Comments

Beware a surge in the number of ZeusVM Banking Trojan-based botnets operating in the wild, since the tools for building and customizing the cybercrime malware are now available for free.

TOPICS:
About a month after the Office of Personnel Management notified employees about a recent hack, the federal government is ramping up research and development of secure email systems.

Federal Researchers Developing New Spoof-Proof Email Security System

July 9, 2015 11:51 am | by Mohana Ravindranath, Nextgov | Comments

About a month after the Office of Personnel Management notified employees about a recent hack, the federal government is ramping up research and development of secure email systems.

TOPICS:
While the Italian surveillance company sells government agencies high-end zero-day proof-of-concept exploits, it secures root systems with the password 'P4ssword.' What's vulnerability commoditization got to do with it?

Hacking Team 0-Day Shows Widespread Dangers Of All Offense, No Defense

July 9, 2015 11:35 am | by Sara Peters, Dark Reading | Comments

While the Italian surveillance company sells government agencies high-end zero-day proof-of-concept exploits, it secures root systems with the password 'P4ssword.' What's vulnerability commoditization got to do with it?

TOPICS:
In February 2013, Twitter detected a hack attack in progress on its corporate network. Sure enough, similar attacks were visited on Facebook, Apple, and Microsoft in the coming weeks. In all four cases, company employees were exposed to a zero-day Java ex

APT Group Steals Corporate Data for Insider Trading

July 9, 2015 8:30 am | by Dan Goodin, Ars Technica | Comments

In February 2013, Twitter detected a hack attack in progress on its corporate network. Sure enough, similar attacks were visited on Facebook, Apple, and Microsoft in the coming weeks. In all four cases, company employees were exposed to a zero-day Java exploit as they viewed a website for iOS developers. Now, security researchers have uncovered dozens of other companies hit by the same attackers.

TOPICS:
Advertisement
A hacker shut down four New Jersey Internet gambling sites for half an hour last week and threatened more cyberattacks over the holiday weekend unless a ransom was paid using the online currency Bitcoin, authorities have said.

Hacker Attacks Gambling Websites, Demands Bitcoin Ransom

July 9, 2015 8:29 am | by Wayne Parry, Associated Press | Comments

A hacker shut down four New Jersey Internet gambling sites for half an hour last week and threatened more cyberattacks over the holiday weekend unless a ransom was paid using the online currency Bitcoin, authorities have said.

TOPICS:
State and local law enforcement officials in Deadwood, South Dakota on Tuesday presented images of an unidentified murder victim in a 15-year-old cold case.

3D Face Images Used to Investigate Murder Case

July 8, 2015 12:18 pm | by Kevin Woster, Keloland.com | Comments

State and local law enforcement officials in Deadwood, South Dakota on Tuesday presented images of an unidentified murder victim in a 15-year-old cold case.

TOPICS:
In a recent letter to Denver Mayor Michael Hancock praising the work of the Denver Police Crime Lab, City Auditor Dennis Gallagher added a suggestion — making the unit an independent agency under the auspices of the state Department of Public Safety.

After Singing Its Praises, Denver City Auditor Suggests Moving Crime Lab

July 8, 2015 11:36 am | by Anthony Cotton, The Denver Post | Comments

In a recent letter to Denver Mayor Michael Hancock praising the work of the Denver Police Crime Lab, City Auditor Dennis Gallagher added a suggestion — making the unit an independent agency under the auspices of the state Department of Public Safety.

TOPICS:
Federal investigators and local authorities have been combing through a wide swath of rural, sparsely populated land as they try to determine what caused an F-16 fighter jet to slam into a small plane over South Carolina, killing the plane's pilot and pas

Investigators Begin Looking Over Area of Aircraft Collision

July 8, 2015 11:24 am | by Susanne M. Schafer, Associated Press | Comments

Federal investigators and local authorities have been combing through a wide swath of rural, sparsely populated land as they try to determine what caused an F-16 fighter jet to slam into a small plane over South Carolina, killing the plane's pilot and passenger.

TOPICS:
The White House is nearing the end of a 30-day “cyber sprint” aimed at plugging the most gaping holes in the government’s network security.

White House Sprints to Patch Security Flaws

July 8, 2015 10:13 am | by Cory Bennett, The Hill | Comments

The White House is nearing the end of a 30-day “cyber sprint” aimed at plugging the most gaping holes in the government’s network security.

TOPICS:
Federal law enforcement officials are pressing their concerns about encryption before Congress, where they will argue to senators on Wednesday that the right to privacy is not absolute and must be weighed against public safety interests.

FBI, Justice Dept. Taking Encryption Concerns to Congress

July 8, 2015 9:45 am | by Eric Tucker, Associated Press | Comments

Federal law enforcement officials warned Wednesday that data encryption is making it harder to hunt for pedophiles and terror suspects, telling senators that consumers' right to privacy is not absolute and must be weighed against public-safety interests.

TOPICS:
An elite group of code makers and code breakers is taking American and British intelligence and law enforcement agencies to task in a new paper that evaluates government proposals to maintain special access to encrypted digital communications.

Security Experts Oppose Government Access to Encrypted Communication

July 8, 2015 8:23 am | by Nicole Perlroth, The New York Times | Comments

An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading