Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

After binding a jewelry store's employees with duct tape last May, two armed robbers drove away from Tanger 1 Outlets with a massive haul. In their getaway car was merchandise worth more than $800,000 from Bluffton's Kay Jewelers. One of the robbers, thou

DNA Lab Increases Efficiency After 5 Years

August 6, 2015 1:07 pm | by Rebecca Lurye, The Beaufort Gazette | Comments

After binding a jewelry store's employees with duct tape last May, two armed robbers drove away from Tanger 1 Outlets with a massive haul. In their getaway car was merchandise worth more than $800,000 from Bluffton's Kay Jewelers. One of the robbers, though, left something just as valuable for investigators - his DNA.

TOPICS:
The May 2014 takedown of the botnet behind the Gameover Zeus banking Trojan taught law enforcement and banking institutions many lessons. The takedown made it clear that banking malware is not just used to take over bank accounts and steal money; it's als

How Banking Trojans are Used for Cyber Espionage

August 6, 2015 10:11 am | by Tracy Kitten, Bank Info Security | Comments

The May 2014 takedown of the botnet behind the Gameover Zeus banking Trojan taught law enforcement and banking institutions many lessons. The takedown made it clear that banking malware is not just used to take over bank accounts and steal money; it's also used to steal corporate data for cyber espionage.

TOPICS:
Thursday at the Black Hat information security conference, Dell SecureWorks researchers unveiled a report on a newly detected hacking group that has targeted companies around the world while stealing massive amounts of industrial data.

100+ Websites Used as 'Watering Holes' by Newly-Discovered Chinese Hacking Group

August 6, 2015 9:29 am | by Sean Gallagher, Ars Technica | Comments

Thursday at the Black Hat information security conference, Dell SecureWorks researchers unveiled a report on a newly detected hacking group that has targeted companies around the world while stealing massive amounts of industrial data. 

TOPICS:
Advertisement
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" standard, a next-generation tool for securing the integrity of electronic information.

NIST Releases SHA-3 Cryptographic Hash Standard

August 6, 2015 9:06 am | by NIST | Comments

The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" standard, a next-generation tool for securing the integrity of electronic information.

TOPICS:
Fiat Chrysler, the maker of Jeeps, is now conducting the first recall to patch a cybersecurity problem, covering 1.4 million Jeeps. And experts and lawmakers are warning the auto industry and regulators to move faster to plug holes created by the dozens o

Automakers Trying to Prevent Hackers From Commandeering Cars

August 6, 2015 8:09 am | by Tom Krisher, Associated Press | Comments

Fiat Chrysler, the maker of Jeeps, is now conducting the first recall to patch a cybersecurity problem, covering 1.4 million Jeeps. And experts and lawmakers are warning the auto industry and regulators to move faster to plug holes created by the dozens of new computers and the growing number of Internet connections in today's automobiles.

TOPICS:
The field of digital evidence is new and rapidly expanding. Potentially, digital evidence offers an important new source of information that will help prosecutors win more convictions.

Top-Tier Needs for Gathering, Utilizing Digital Evidence

August 6, 2015 8:08 am | by NIJ | Comments

The field of digital evidence is new and rapidly expanding. Potentially, digital evidence offers an important new source of information that will help prosecutors win more convictions. 

TOPICS:
Ohio Attorney General Mike DeWine has announced that forensic scientists with the Ohio Bureau of Criminal Investigation (BCI) have now tested more than 8,000 sexual assault kits as part of a special initiative to test rape kits that had never been tested

Sexual Assault Kits Tested Tops 8,000 in Ohio

August 5, 2015 2:12 pm | by Ohio Attorney General | Comments

Ohio Attorney General Mike DeWine has announced that forensic scientists with the Ohio Bureau of Criminal Investigation (BCI) have now tested more than 8,000 sexual assault kits as part of a special initiative to test rape kits that had never been tested for DNA.

TOPICS:
Robbery has been ruled out as a motive in the gruesome deaths of a woman and her two adult sons in the Florida Panhandle, killings that authorities speculate may have been carried out as part of a ritual.

Sheriff: 'Ritualistic' Killings May be Tied to Blue Moon

August 5, 2015 1:48 pm | by Melissa Nelson-Gabriel, Associated Press | Comments

Robbery has been ruled out as a motive in the gruesome deaths of a woman and her two adult sons in the Florida Panhandle, killings that authorities speculate may have been carried out as part of a ritual.

TOPICS:
Advertisement
China is planning to set up "network security offices" in major Internet companies and for websites so authorities can move more quickly against illegal online behavior, the Ministry of Public Security said in a statement.

China to Put Security Teams in Major Internet Firms, Websites

August 5, 2015 11:12 am | by Adam Jourdan, Reuters | Comments

China is planning to set up "network security offices" in major Internet companies and for websites so authorities can move more quickly against illegal online behavior, the Ministry of Public Security said in a statement.

TOPICS:
In 1995, Vern Paxson, then a computer science Ph.D. student at the University of California, Berkeley, began writing what would eventually become Bro, the ground-breaking open source cybersecurity software that defends innumerable networks today, includin

Cyber Defense, Forensic Tool Turns 20

August 5, 2015 10:28 am | by Aaron Dubrow, National Science Foundation | Comments

In 1995, Vern Paxson, then a computer science Ph.D. student at the University of California, Berkeley, began writing what would eventually become Bro, the ground-breaking open source cybersecurity software that defends innumerable networks today, including key government and business enterprises in the U.S. On Tuesday, at its annual meeting of users and cybersecurity engineers, Bro celebrates its 20th Anniversary.

TOPICS:
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action. Conficker's quick spread was so alarming that an organization was formed called the Conficker Working Group that was tasked

Cleaning Up Botnets Takes Years, if Ever, to Complete

August 5, 2015 9:50 am | by Jeremy Kirk, CSO | Comments

In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action. Conficker's quick spread was so alarming that an organization was formed called the Conficker Working Group that was tasked with stopping the botnet. But seven years later, there are still about 1 million computers around the world infected with the malware despite the years-long cleanup effort.

TOPICS:
What if it was possible to remotely steal data from a target’s computer without having to physically install a bug? And what if you could do so without having to send that data through the internet using the target’s wireless network, which might set off

How to Turn a Cheap Printer Into a Stealthy Bugging Device

August 5, 2015 9:28 am | by Lorenzo Franceschi-Bicchierai, Motherboard | Comments

What if it was possible to remotely steal data from a target’s computer without having to physically install a bug? And what if you could do so without having to send that data through the internet using the target’s wireless network, which might set off alarms?

TOPICS:
A drone dropped a package of drugs into a prison yard while inmates were outside, sparking a fight, prison officials said.

Drone Drops Drugs in Ohio Prison Yard, Spurring Inmate Fight

August 4, 2015 3:02 pm | by The Associated Press | Comments

A drone dropped a package of drugs into a prison yard while inmates were outside, sparking a fight, prison officials said.

TOPICS:
Fifteen years after 17-year-old Nicole L. Bowers was last seen at her Morris home,   Channahon, Illinois investigators had DNA evidence tested in her murder case.

DNA Being Tested in Illinois County Cold Case

August 4, 2015 2:49 pm | by Brian Stanley, The Herald-News | Comments

Fifteen years after 17-year-old Nicole L. Bowers was last seen at her Morris home, Channahon, Illinois investigators had DNA evidence tested in her murder case.

TOPICS:
Hackers blocked part of the German federal prosecutor's office, a spokeswoman said on Monday, but she could not give any details about the scope of the attack or the possible perpetrators.

Hackers Take Down Part of German Federal Prosecutor's Website

August 4, 2015 11:12 am | by Reuters | Comments

Hackers blocked part of the German federal prosecutor's office, a spokeswoman said on Monday, but she could not give any details about the scope of the attack or the possible perpetrators.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading