Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

In the 18 months since the Silk Road online black market for narcotics was taken down by a swarm of three-letter agencies, a site known as Evolution has taken its place at the top of the dark web drug trade. Now Evolution, too, has suddenly dropped off th

The Dark Web's Top Drug Market, Evolution, Just Vanished

March 18, 2015 11:26 am | by Andy Greenberg, Wired | Comments

In the 18 months since the Silk Road online black market for narcotics was taken down by a swarm of three-letter agencies, a site known as Evolution has taken its place at the top of the dark web drug trade. Now Evolution, too, has suddenly dropped off the face of the internet. But unlike its Silk Road predecessor, there’s no indication that law enforcement took down the newer black market.

TOPICS:
Health insurer Premera Blue Cross revealed recently that it has discovered a sophisticated cyber attack that tried to gain unauthorized access to their IT systems.

Medical, Personal Information Exposed at Premera Blue Cross

March 18, 2015 10:52 am | by Ernie Austin, Associate Editor | Comments

Health insurer Premera Blue Cross revealed recently that it has discovered a sophisticated cyber attack that tried to gain unauthorized access to their IT systems.

TOPICS:
Android and iOS mobile apps are still vulnerable to the recent FREAK attacks. Patching browsers may have made them safe, but FireEye has reported that the Android and iOS platforms and apps are still open to encryption manipulations.

Mobile Phones are FREAKing Out

March 18, 2015 10:13 am | by Ernie Austin, Associate Editor | Comments

Android and iOS mobile apps are still vulnerable to the recent FREAK attacks. Patching browsers may have made them safe, but FireEye has reported that the Android and iOS platforms and apps are still open to encryption manipulations.  

TOPICS:
Advertisement
A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users.

Deanonymizing Tor Users With Raptor Attacks

March 18, 2015 8:31 am | by Zeljka Zorn, Help Net Security | Comments

A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users.

TOPICS:
New and subtle business models are emerging for cyber criminals, boosting their sales of stolen data and offering new ways to inflict damage on target organizations.

Cyber Criminals ​Boost Sales Through 'Data Laundering'

March 18, 2015 8:30 am | Comments

New and subtle business models are emerging for cyber criminals, boosting their sales of stolen data and offering new ways to inflict damage on target organizations.

TOPICS:
Most Americans have not altered their online behavior since the revelations almost two years ago by former National Security Agency contractor Edward Snowden, according to a survey by the Pew Research Center.

Survey Says Americans in Privacy Denial After Snowden

March 17, 2015 11:54 am | by Ernie Austin, Associate Editor | Comments

Most Americans have not altered their online behavior since the revelations almost two years ago by former National Security Agency contractor Edward Snowden, according to a survey by the Pew Research Center.

TOPICS:

Bill Would Require Post-Conviction Preservation of DNA

March 17, 2015 10:43 am | by Rachel La Corte, Associated Press | Comments

A bill that has passed the House and is awaiting action in the Senate would require DNA collected in any felony case charged as a violent or sex offense to be preserved through the length of the offender's sentence, including post-prison community custody.

TOPICS:

Cyber CSI: The Challenges of Digital Forensics

March 17, 2015 10:31 am | by Richard Boddington | Comments

Broadly speaking, digital evidence is information found on a wide range of electronic devices that is useful in court because of its probative value. It’s like the digital equivalent of a fingerprint or a muddy boot.

TOPICS:
Advertisement

Living Relatives Needed to Help Identify Bodies in Mass Grave

March 17, 2015 10:19 am | by Kamcilla Pillay, Daily News | Comments

DNA testing could help identify the bodies found in mass graves on a KwaZulu-Natal farm in South Africa - but only if living relatives came forward for tissue samples to be compared, said a genetics expert.

TOPICS:

DNA Identifies Missing WWI Soldier

March 17, 2015 10:09 am | by Elizabeth Henson, The Daily Telegraph | Comments

​Shiralee Reardon can only imagine the courage it must have taken for her great uncle to fight and die in the bloodiest 24 hours in Australian history. Corigliano was among the more than 5500 Australian soldiers killed, wounded or taken prisoner on the night of July 19-20, 1916.

TOPICS:
Forty-two amateur cyber defenders gathered on the HMS Belfast in London recently to take part in a cyber terrorist attack simulation run by the Cyber Security Challenge UK.

Cyber War Staged in Central London

March 17, 2015 8:24 am | by Emiko Jozuka, Ars Technica | Comments

Forty-two amateur cyber defenders gathered on the HMS Belfast in London recently to take part in a cyberterrorist attack simulation run by the Cyber Security Challenge UK.

TOPICS:
The name suggests a parade of a C-list websites. There was NewJunk4U.com and Monster-Ads.net, CoffeeHausBlog.com and SuddenPlot.com. But, these sad-sounding domains actually were artful creations of the National Security Agency: They were fronts for distr

Psssst: Wanna Buy a Used Spy Website?

March 16, 2015 10:53 am | by Kevin Poulsen, Wired | Comments

The name suggests a parade of a C-list websites. There was NewJunk4U.com and Monster-Ads.net, CoffeeHausBlog.com and SuddenPlot.com. But, these sad-sounding domains actually were artful creations of the National Security Agency: They were fronts for distributing and controlling government malware around the world.

TOPICS:

Prominent Forensic Expert to Help Probe Taiwan Prison Hostage Case

March 16, 2015 10:33 am | by Tsai Pei-chi and Christie Chen | Comments

Kaohsiung authorities have asked renowned forensic scientist Henry Lee to assist with the investigation of a prison hostage crisis in the city last month that ended with the six hostage takers, all inmates, committing suicide.

TOPICS:

Biden in Md. to Discuss Funds for Rape Kit Testing

March 16, 2015 10:19 am | by Associated Press | Comments

Vice President Joe Biden will join Senator Barbara Mikulski on Monday in Pikesville to highlight funding directed toward clearing a backlog of hundreds of thousands of untested rape kits.

TOPICS:

Modern Forensic Science: Solving The Oldest And Coldest Cases

March 16, 2015 10:03 am | by Jared Stern | Comments

Modern forensic science is useful for investigators as a means of solving the most complex crimes. But, new research unlocks the mysteries of the life and death of historical figures like King Richard III and the curious case of Cangrande I della Scala. 

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading