Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.

Super Secretive Malware Wipes Hard Drive to Prevent Analysis

May 5, 2015 10:29 am | by Dan Goodin, Ars Technica | Comments

Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.

TOPICS:

Year in Jail, No Indictment: Crime Lab Snafu Blamed

May 4, 2015 1:42 pm | by Kate Royals, The Clarion-Ledger | Comments

Despite six grand juries convening since his arrest, 45-year-old Eban Siler has not yet been served an indictment and can’t pay his $100,000 bond. He has been in Rankin County Jail since May 28 of last year.

TOPICS:
Rutgers University will allow professors to cancel final exams and is urging   flexibility in grading so that students don’t suffer because of a cyber attack that   hit the university last Monday and crippled Internet service for most of the week.

Rutgers Students Adjusts Grading, Final Exam Policies Due to Cyber Attack

May 4, 2015 1:28 pm | by Hannan Adely, The Record | Comments

Rutgers University will allow professors to cancel final exams and is urging flexibility in grading so that students don’t suffer because of a cyber attack that hit the university last Monday and crippled Internet service for most of the week.

TOPICS:
Advertisement
While California’s Silicon Valley is the technology capital of America, cities and states across the country are now vying to dominate the next big economic frontier – the booming market for securing what actually lies within the nation’s electronic netwo

How Will the Cyber Gold Rush Pan Out for Cities and States?

May 4, 2015 12:17 pm | by Sara Sorcher, The Christian Science Monitor | Comments

While California’s Silicon Valley is the technology capital of America, cities and states across the country are now vying to dominate the next big economic frontier – the booming market for securing what actually lies within the nation’s electronic networks. 

TOPICS:
The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already

Digital Thieves Commit Non-Cyber Crimes

May 4, 2015 9:14 am | by Rosa Prince, The Telegraph | Comments

The image of a cyber criminal might be of a geeky teenager drawn into the murky world of the Internet’s dark side while spending hours surfing online in the bedroom of his family home. But a new study has discovered that in fact most online crooks already have a background in more traditional offending.

TOPICS:
They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on par

Detectives Search for Clues to Killing in Victim's Tattoo

May 1, 2015 12:35 pm | by Michael Wilson, The New York Times | Comments

They found a hand first, in a gritty inlet at the mouth of Coney Island Creek. Other body parts were found nearby, none of any use in identifying the person. A break in the case came in recent weeks. It started with a closer look at a patch of skin on part of a leg — leading to the first bona fide clue that, upon further description, is not for the faint of heart.

TOPICS:
An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

Debate Over Setting Blood Standard for Marijuana-Impaired Driving

May 1, 2015 12:13 pm | by Michael Shepherd, centralmaine.com | Comments

An effort before the Maine Legislature to set a blood limit standard for marijuana-impaired drivers was criticized by pot advocates on Thursday who said science doesn’t support it.

TOPICS:
UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal informatio

UC Berkeley Campus Announces Data Breach

May 1, 2015 11:11 am | by Janet Gilmore, UC Berkeley | Comments

UC Berkeley officials have announced that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information.

TOPICS:
Advertisement
On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google i

Google's New Version of Password Alert Blocking Bypass is Bypassed

May 1, 2015 10:49 am | by Dan Goodin, Ars Technica | Comments

On Thursday, it was reported that a new service that warns when Google account users' passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, Google issued an update that blocked the exploit. Now the same researcher has figured out a way to block the new version, too.

TOPICS:
The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

Plan for the Next Breach With Incident Response Forensics

May 1, 2015 10:13 am | by (ISC)2 Government Advisory Council Executive Writers Bureau, Lou Magnotti | Comments

The only thing worse than a data breach is not knowing how it happened. In order to prevent system failure, minimize the loss and prevent similar breaches, agencies need an incident response plan that includes forensic investigation.

TOPICS:
This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

History and Functions of Computer Security Incident Response Teams

May 1, 2015 10:03 am | by Isabel Skierka, Mirko Hohmann, Robert Morgus and Tim Maurer, New America Foundation | Comments

This paper examines the history, types and culture of Computer Security Incident Response Teams (CSIRTs). It is intended to provide a short history and overview of the culture of CSIRTs in order to help build a common understanding.

TOPICS:
A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

NSA So Overwhelmed With Data, It's No Longer Effective, Says Whistleblower

May 1, 2015 9:34 am | by Zack Whittaker, ZD Net | Comments

A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's still "pissed" by what he's seen leak in the past two years.

TOPICS:
Forensic document examiners (FDEs) are trained to look not only for substantial similarities or differences among writing samples, but also for repeated small characteristics which may be sufficient to establish the source of the writing. However, several

Eye-Tracking Study Validates Handwriting Analysis

May 1, 2015 8:28 am | by Mara Merlino, NIJ | Comments

Forensic document examiners (FDEs) are trained to look not only for substantial similarities or differences among writing samples, but also for repeated small characteristics which may be sufficient to establish the source of the writing. However, several court cases have challenged the admissibility of forensic document examination and brought some important issues — including potential confirmation bias among FDEs — into focus.

TOPICS:

Germany Foils Suspected Boston-Style Attack, Officials Say

May 1, 2015 8:15 am | by Frank Jordans, Associated Press | Comments

German authorities foiled what they believe may have been an imminent Boston Marathon-style attack on a professional cycling race planned for Friday, seizing a cache of weapons, including a pipe bomb, and chemicals that can be used to make explosives in a raid on a suspected Islamic extremist's home outside Frankfurt.

TOPICS:
Cook County Circuit Judge Thomas J. Lipscomb warned jurors that images of 20-year-old Jessica Mejia's body that were about to be projected on a screen were "graphic" and "not the kind generally seen by the public." Minutes later, Mejia's family sat in the

Evidence Technicians Testify Protocol Was Followed in Photographing Dead Woman's Body

April 30, 2015 2:57 pm | by Tara Kadioglu, Chicago Tribune | Comments

Cook County Circuit Judge Thomas Lipscomb warned jurors that images of 20-year-old Jessica Mejia's body that were about to be projected on a screen were "graphic" and "not the kind generally seen by the public." Minutes later, Mejia's family sat in the corner of the courtroom, wiping tears from their cheeks as they listened to testimony from Maria Lopez, the evidence technician for the Cook County sheriff's department who took the photos.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading