Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Researchers at Kaspersky Lab in Russia have discovered yet another new nation-state attack attributed to members of the infamous Stuxnet and Duqu gang. But this time the perpetrators were hiding in plain sight — inside the security firm’s own networks.

Kaspersky Finds New Nation-State Attack - In Its Own Network

June 10, 2015 9:41 am | by Kim Zetter, Wired | Comments

Researchers at Kaspersky Lab in Russia have discovered yet another new nation-state attack attributed to members of the infamous Stuxnet and Duqu gang. But this time the perpetrators were hiding in plain sight — inside the security firm’s own networks.

TOPICS:
Police have arrested dozens of suspects in an international investigation into a cybercrime gang that siphoned millions of euros from victims' accounts in an identity fraud scam.

Police Arrest Dozens in European Cybercrime Investigation

June 10, 2015 9:29 am | Comments

Police have arrested dozens of suspects in an international investigation into a cybercrime gang that siphoned millions of euros from victims' accounts in an identity fraud scam.

TOPICS:
The FBI has been lobbying hard to get unfettered access to the messages passed by encrypted messaging services. But it apparently didn't need that level of access to WhatsApp messages sent between members of an alleged Chechen jihadist group operating in

Intercepted WhatsApp Messages Led to Belgian Terror Arrests

June 10, 2015 9:18 am | by Sean Gallagher, Ars Technica | Comments

The FBI has been lobbying hard to get unfettered access to the messages passed by encrypted messaging services. But it apparently didn't need that level of access to WhatsApp messages sent between members of an alleged Chechen jihadist group operating in Belgium.

TOPICS:
Advertisement

Could a Bite Mark Catch a Killer?

June 9, 2015 10:36 am | by Beth Schwartzapfel, The Marshall Project | Comments

When used in expert testimony at a criminal trial, terms like “incisal edge” and “the diastema of the two teeth” sound convincingly scientific. 

TOPICS:
As swatting continues to vex New Jersey law enforcement agencies and shut down or evacuate schools, malls and hospitals, experts say it's a relatively easy criminal prank to learn and pull off.

Swatting in NJ: Easy to Do, Harder to Investigate

June 9, 2015 10:27 am | by Kevin Shea, NJ.com | Comments

As swatting continues to vex New Jersey law enforcement agencies and shut down or evacuate schools, malls and hospitals, experts say it's a relatively easy criminal prank to learn and pull off.

TOPICS:

DNA From Last Missing Quake Victims Received

June 9, 2015 10:18 am | by Julia Chan, Malay Mail Online | Comments

​Genetic samples from families of the two missing Singaporeans climbers still missing have been submitted to Malaysian forensic authorities to enable comparison with body parts retrieved from Mount Kinabalu following last week’s earthquake.

TOPICS:
There was a staggering 165 percent increase in ransomware attacks in the first three months of this year, while Adobe Flash malware soared 317 percent from Q4 2014, according to the latest threat report from McAfee.

Flash Malware Soars Over 300% in Q1 2015

June 9, 2015 10:06 am | by Phil Muncaster, Infosecurity Magazine | Comments

There was a staggering 165 percent increase in ransomware attacks in the first three months of this year, while Adobe Flash malware soared 317 percent from Q4 2014, according to the latest threat report from McAfee.

TOPICS:
Eighty percent of IT professionals believe social media is an easy way for hackers to gain access to corporate networks because it is often neglected in terms of security, and furthermore 36 percent even admit that their company could be breached by a hac

Social Media Security Still a Low Priority

June 9, 2015 9:42 am | by Help Net Security | Comments

Eighty percent of IT professionals believe social media is an easy way for hackers to gain access to corporate networks because it is often neglected in terms of security, and furthermore 36 percent even admit that their company could be breached by a hacker through one of their employees’ social media access at work.

TOPICS:
Advertisement
Insulin pumps, heart monitors, x-ray communications systems and other medical devices already have been proven vulnerable to cyber attack by security researchers, but a new report confirms that hospital medical devices are being abused by cyber criminals

Hospital Medical Devices Used As Weapons in Cyber Attacks

June 9, 2015 9:29 am | by Kelly Jackson Higgins, Dark Reading | Comments

Insulin pumps, heart monitors, x-ray communications systems and other medical devices already have been proven vulnerable to cyber attack by security researchers, but a new report confirms that hospital medical devices are being abused by cyber criminals and possibly cyber spies as a stepping-stone within healthcare networks to nab valuable healthcare identities and information.

TOPICS:
Top U.S. tech companies are warning the Obama administration against imposing new policies that the companies say would weaken increasingly sophisticated encryption systems designed to protect consumers' privacy.

US Tech Industry Appeals to Obama to Keep Hands Off Encryption

June 9, 2015 9:15 am | by Richard Cowan, Reuters | Comments

Top U.S. tech companies are warning the Obama administration against imposing new policies that the companies say would weaken increasingly sophisticated encryption systems designed to protect consumers' privacy.

TOPICS:
In April, federal authorities detected an ongoing remote attack targeting the U.S. Office of Personnel Management computer systems. While the attack was eventually uncovered using the Department of Homeland Security's (DHS) Einstein — the multibillion-dol

Why the 'Biggest Government Hack Ever' Got Past the Feds

June 8, 2015 12:22 pm | by Sean Gallagher, Ars Technica | Comments

In April, federal authorities detected an ongoing remote attack targeting the U.S. Office of Personnel Management computer systems. While the attack was eventually uncovered using the Department of Homeland Security's (DHS) Einstein — the multibillion-dollar intrusion detection and prevention system — it managed to evade this detection entirely until another OPM breach spurred deeper examination.

TOPICS:

The Art Behind Age Progression Images

June 8, 2015 12:07 pm | by Tania Kohut, Global News | Comments

Forensic artists are often tasked with creating age progression renderings to show how a person might look years, or even decades later.

TOPICS:

Texas Cop Put on Leave After Video of Arrest Surfaces

June 8, 2015 11:58 am | by Dean Schabner, USA Today | Comments

The now-suspended officer uses profanity, grabs the girl by the back of her head and forces her to the ground, face-down.

TOPICS:
Researchers have discovered MalumPoS, a new point-of-sale malware designed to steal credit card data from hotels and other US businesses.

MalumPoS Malware Targets Hotels, Scrapes Customer Credit Cards

June 8, 2015 11:51 am | by Charlie Osborne, ZD Net | Comments

Researchers have discovered MalumPoS, a new point-of-sale malware designed to steal credit card data from hotels and other US businesses.

TOPICS:
The latest weapon in the fight against cheating on China's all-important college   entrance exam is a six-propeller drone.

Drone is Latest Weapon Against Cheating on China School Exam

June 8, 2015 11:36 am | by The Associated Press | Comments

The latest weapon in the fight against cheating on China's all-important college entrance exam is a six-propeller drone.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading