Hosted at the European Cybercrime Centre (EC3) at Europol, the Joint Cybercrime Action Taskforce (J-CAT), which is being piloted for six months, will coordinate international investigations with partners working side-by-side to take action against key cybercrime threats and top targets, such as underground forums and malware, including banking Trojans.
Security researchers have spotted what they believe to be a second pro-al Assad hacking group, dubbed the Syrian Malware Team, using a .NET RAT to attack targets.
For two and a half years, the Dread Pirate Roberts and his Silk Road black market ruled the Dark Web. But last year’s FBI’s takedown of that narcotics smorgasbord opened the underground trade to competitors. Now those sites have a new leader, one that’s bigger than the Silk Road ever was and continues to grow explosively.
The FBI says it was addressing allegations that online accounts of several celebrities, including Oscar-winner Jennifer Lawrence, had been hacked, leading to the posting of their nude photographs online. The agency did not say what actions it was taking to investigate who was responsible for posting naked photos of Lawrence and other stars.
Two North Carolina men who have been behind bars for 30 years, one of them on death row, will go before a judge on Tuesday morning to present new DNA evidence of their innocence of the murder and rape for which they were convicted as teenagers in 1984.
Chicago Police Commander Glenn Evans allegedly shoved the barrel of his gun down the throat of Rickey J. Williams in Jan 2013, an act corroborated via DNA testing. So why did it take until Wednesday to charge Evans with aggravated battery and misconduct? According to Cook County State’s Attorney Anita Alvarez, it was because of a backlog of cases awaiting DNA testing at the Illinois State Police crime lab.
When people die, Cheryl Johnston’s work begins. A forensic anthropologist at Western Carolina University, Johnston oversees the Forensic Osteological Research Station – or FOReSt – one of our nation’s six human decomposition facilities. Over a year’s time, bodies here are exposed to light, rain, humidity, heat, cold, wind, and wildlife.
Within four days of the first public reports of a major flaw in OpenSSL's software for securing communications on the Internet, mass attacks searched for and targeted vulnerable servers. In a report, IBM found that while the attacks have died down, approximately half of the original 500,000 potentially vulnerable servers remain unpatched.
Mobile forensics has changed the methodology when it comes to offender profiling. The frequent use of mobile devices has provided investigators with another source for profiling criminal suspects, as well as an insight into their habits and personalities.
As in any job, in cybersecurity it’s the paperwork that gets you. In a recent study, the Government Accountability Office found that agencies are doing an incomplete job in documenting their response to security incidents.
Schuylkill County, Pennsylvania, has changed its policy regarding compensation rates for its deputy coroners in an effort to cut costs. Proposed by County Coroner Dr. David J. Moylan, the new per diem compensation rate will be $50 for all job responsibilities starting Friday. That rate includes mileage, photographs and documentation associated with a case.
The FBI says it is modernizing the way it stores fingerprint cards, criminal history folders and civil identity files by digitally converting more than 30 million records – and as many as 83 million fingerprint cards. The organization says it is fully activating its Next Generation Identification (NGI) system, a digital platform for biometric and other types of identity information.
Researchers have made the first study of the thanatomicrobiome – the army of gut microbes that take over your internal organs once you are dead. The results could have applications in forensic science and medicine. Understanding how microbes inside a dead body colonise it can help pathologists work out the time of death, where the body has been lying, and how its decomposition could affect the soil and ecology.
Much has been made of the aging infrastructure and outdated software tools that are used to protect the power grid in the US from cybe attack, but a new era of code-breaking quantum computers threatens to give criminals future tech that rivals any sci-fi movie plot.
U.S. forensic experts have unmasked the alleged British ISIS militant who killed American photojournalist James Foley in a computer reconstruction of his face. With Arab features and seemingly in his late 20s or 30s, the reconstruction of Foley’s killer appeared in two images reported by ABC news, which added that experts consulted with the U.S. government.