In October, as a result of thefts and tampering at the now-closed Office of the Chief Medical Examiner, police agencies across Delaware will begin using clear, heat-sealed plastic bags to secure drug evidence.
In a second search of the home of the man believed to be the last person seen with a missing University of Virginia student, officials said they took pieces of clothing, but they would not elaborate on the importance of the items. Police have said they hope to receive lab results late Tuesday from items recovered during the initial searches.
One of the largest, most comprehensive crime labs in the world is analyzing evidence collected in the disappearance and killing of five-year-old Ja'Naya Thompson.
Forensic tests are being carried out on a knife found during the search for missing teenager Alice Gross. The investigation into her disappearance is focusing on the River Brent and its banks near Ealing Hospital in west London, where the knife was found.
A continuing trend of are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.
When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. Apparently, the company wasn’t helped much by its selection of a security architect either.
New York's financial regulator says his agency will focus on cybersecurity over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night.
In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.
Financial cybercrime Trojans, originally used to steal credentials from online banking users, are increasingly being used for espionage purposes.
After a security incident is detected tremendous resources are spent in the forensic investigation trying to figure out what exactly happened and what data, if any, was compromised. If the forensic investigation doesn’t yield definitive results fairly quickly the organization is left with no choice but to assume the worst.
DNA from blood found in Dante Taylor’s vehicle and items at his home matches that of the two women killed last summer in Sodus, New York. That was the testimony of a forensic scientist during Taylor’s trial in Wayne County Court.
A bag of human remains — overlooked and forgotten since 2006 — was discovered in a refrigerator at the Delaware Office of the Chief Medical Examiner, the latest misstep for the scandal-plagued agency.
The Colorado Bureau of Investigation is moving its forensics lab to a bigger building to accommodate a rising demand for DNA analysis. The agency says the new lab will help improve turnaround time.
Forensic firearms analysis is the subject of a new graduate certificate program offered by the Forensic and National Security Sciences Institute (FNSSI) in Syracuse University’s College of Arts and Sciences.
One of the most important tasks for a forensic scientist investigating a death is to determine when the person died. Forensic biologists wondered whether microscopic soil-dwelling organisms could help date older corpses.