Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

An elite group of code makers and code breakers is taking American and British intelligence and law enforcement agencies to task in a new paper that evaluates government proposals to maintain special access to encrypted digital communications.

Security Experts Oppose Government Access to Encrypted Communication

July 8, 2015 8:23 am | by Nicole Perlroth, The New York Times | Comments

An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.

TOPICS:
In the social Internet, building a legion of interconnected bots - all accessible from a single computer - is quicker and easier than ever before.

The Rise of Social Media Botnets

July 8, 2015 8:22 am | by James C. Foster, Dark Reading | Comments

In the social Internet, building a legion of interconnected bots - all accessible from a single computer - is quicker and easier than ever before.

TOPICS:
Suffocation, how to slash a person's throat, removing blood stains, and destroying DNA. A computer, which prosecutors say Jonathan Crupi used, searched those grisly topics less than seven months before Crupi allegedly slayed his wife, a Police Department

Alleged Slayer Searched Internet for Death Methods, DNA Removal

July 8, 2015 8:22 am | by Frank Donnelly, Staten Island Advance | Comments

Suffocation, how to slash a person's throat, removing blood stains, and destroying DNA. A computer, which prosecutors say Jonathan Crupi used, searched those grisly topics less than seven months before Crupi allegedly slayed his wife, a Police Department Computer Crimes Squad detective testified on Monday.

TOPICS:
Advertisement
Former Attorney General Eric Holder said today that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow.

Eric Holder: The Justice Department Could Strike Deal With Edward Snowden

July 8, 2015 8:21 am | by Michael Isikoff, Yahoo! Politics | Comments

Former Attorney General Eric Holder has said that a “possibility exists” for the Justice Department to cut a deal with former NSA contractor Edward Snowden that would allow him to return to the United States from Moscow.

TOPICS:

Man Arrested in July 4 Slaying on Metro Train

July 7, 2015 12:01 pm | by Peter Hermann, Faiz Siddiqui and Keith L. Alexander, The Washington Post | Comments

Authorities suspect that the man charged with fatally stabbing a passenger during a daytime robbery aboard a Metro train Saturday may have been high on synthetic drugs.

TOPICS:
The recently detected cyber attacks at Pennsylvania State University may spell bad news for other colleges and universities, according to IT security experts. Hackers such as those that targeted Penn State don’t set their sights on individual institutions

Universities are a Playground for Hackers

July 7, 2015 11:29 am | by Carl Straumsheim, Inside Higher Ed | Comments

The recently detected cyber attacks at Pennsylvania State University may spell bad news for other colleges and universities, according to IT security experts. Hackers such as those that targeted Penn State don’t set their sights on individual institutions, but on entire industries.

TOPICS:
As part of their routine combat training, Army brigades will be more rigorously challenged to fight enemies in cyberspace.

Army Embeds Cyber Forces in Combat Training Drills

July 7, 2015 10:57 am | by Sandra I. Erwin, National Defense | Comments

As part of their routine combat training, Army brigades will be more rigorously challenged to fight enemies in cyberspace.

TOPICS:

Full Conference Program Announced for 2015 R&D 100 Awards & Technology Conference

July 7, 2015 10:35 am | by Advantage Business Media | Comments

Advantage Business Media’s R&D Magazine, sponsor of the R&D 100 Awards, today announced the full conference agenda for the R&D 100 Technology Conference to be held November 12-13, 2015 at Caesars Palace in Las Vegas, Nevada.

Advertisement
Privacy and human rights advocates are having a field day picking through a massive leak purporting to show spyware developer Hacking Team's most candid moments, including documents that appear to contradict the company's carefully scripted PR campaign.

Massive Leak Reveals Hacking Team's Most Private Moments in Messy Detail

July 7, 2015 10:31 am | by Dan Goodin, Ars Technica | Comments

Privacy and human rights advocates are having a field day picking through a massive leak purporting to show spyware developer Hacking Team's most candid moments, including documents that appear to contradict the company's carefully scripted PR campaign.

TOPICS:
The cyber attacker who stole 400GB in corporate data belonging to spyware firm Hacking Team has come forward.

Hacking Team Data Theft Culprit Exposed

July 7, 2015 10:01 am | by Charlie Osborne, ZDNet | Comments

The cyber attacker who stole 400GB in corporate data belonging to spyware firm Hacking Team has come forward.

TOPICS:

New Method Could Help Estimate Time of Death for a 10-Day-Old Corpse

July 6, 2015 12:51 pm | by Stefano Vanin, The Conversation | Comments

In forensic investigations, the time since death is known as the post-mortem interval. Forensic pathologists can use the physical and chemical transformations that occur in the body after the death in order to estimate it

TOPICS:

How Skulls Fracture Could Impact Child Abuse Cases

July 6, 2015 11:05 am | by Matt Mencarini, Lansing State Journal | Comments

What they found was that multiple skull fractures and fractures that aren't connected can come from a single impact. The greater the impact force the more fractures there were, and that the direction — or line of the actual fracture — pointed back to the location of impact.

TOPICS:
The FBI's updated Cyber Most Wanted List now includes 15 men (no women). The Bureau is still not offering monetary rewards for information leading to the arrests of five members of the People's Republic of China's People's Liberation Army who remain on th

FBI Offering $4.3M for Help Finding Cyber Most-Wanted

July 6, 2015 10:40 am | by Sara Peters, Dark Reading | Comments

The FBI's updated Cyber Most Wanted List now includes 15 men (no women). The Bureau is still not offering monetary rewards for information leading to the arrests of five members of the People's Republic of China's People's Liberation Army who remain on the list. However, they are offering bounties for most others, which add up to over $4.3 million.

TOPICS:
Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.

Hacking Team Hacked, 400GB+ of Company Documents and Emails Leaked

July 6, 2015 10:17 am | by Zeljka Zorz, Help Net Security | Comments

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.

TOPICS:
China on Monday downplayed an accusation by U.S. Democratic presidential candidate Hillary Clinton that Beijing had tried to "hack into everything that doesn't move in America."

China Downplays Hillary Clinton Claim It Hacked US Information

July 6, 2015 9:55 am | by Reuters | Comments

China on Monday downplayed an accusation by U.S. Democratic presidential candidate Hillary Clinton that Beijing had tried to "hack into everything that doesn't move in America."

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading