Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

FBI Cyber Expert Fights Real-world Crime

July 14, 2014 10:51 am | by Joe Mankak, Associated Press | Comments

J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Especially since he transferred from Washington, D.C., in 2005 to fill a vacancy in the Pittsburgh field office's cyber squad — which he now heads.

TOPICS:

Chinese Man Hacks Military Data from US Computers

July 14, 2014 10:32 am | by Julia Watson, Associated Press | Comments

U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.

TOPICS:

Forensic Sciences Student Pursues Career in Military Intelligence

July 11, 2014 2:20 pm | by Angel Futrell, Texas A&M Univ. | Comments

Jeffrey Ng, a Forensic and Investigative Sciences and Biomedical Sciences major at Texas A&M University answers quuestions about his time at Texas A&M and what his plan are for his career.               

Advertisement

MSU Professor Appointed to NIST Forensic Science Standards Board

July 11, 2014 2:03 pm | by Michigan State Univ. | Comments

The National Institute of Standards and Technology, in partnership with the U.S. Department of Justice, have named Michigan State University’s Anil Jain among the first 17 appointments to the Forensic Science Standards Board.       

TOPICS:

Medical App Amasses Evidence against War-zone Rapists

July 11, 2014 1:42 pm | by Aviva Rutkin, New Scientist | Comments

Hundreds of women are raped in the war-torn Democratic Republic of the Congo every day. A new app for doctors could help prosecute some of the perpetrators.                           

TOPICS:

Learn Formal Firearm Examination Skills

July 11, 2014 12:29 pm | by NIJ | Comments

West Virginia University is offering an Introduction to Firearm Examination course. This NIJ-funded course will give participants a basic understanding of firearm examination techniques with hands-on practice with firearm components and microscopic comparisons.

TOPICS:

Global Law Enforcement, Security Firms Team Up, Take Down Shylock

July 11, 2014 11:21 am | by Sara Peters, Dark Reading | Comments

A month after the GameOver ZeuS sting, another bank fraud group's operations has been disrupted by an international collaboration of security firms and law enforcement agencies. The new target is Shylock, a Trojan that has stolen from banks in the U.S., Italy, and especially the United Kingdom.

TOPICS:

China Says iPhone is a Threat to National Security

July 11, 2014 11:04 am | by Reuters | Comments

Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.                           

TOPICS:
Advertisement

US and UK Consumers Avoid Pirated Content

July 11, 2014 9:55 am | by Infosecurity | Comments

Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.                                               

TOPICS:

Computer Forensics Key in Hot Car Child Death Case

July 10, 2014 9:26 am | Comments

Justin Ross Harris is charged with felony murder and second-degree child cruelty in the death of his son, Cooper. He claims that he forgot to drop his son off at daycare before heading to work. Cooper Harris spent nearly seven hours in the SUV as temperatures rose to 88 degrees. Computer forensics will be key in the case as police uncovered Harris' sexting and penchant for videos about death from his computers.  

TOPICS:

Follow Malware's Tracks to Thwart Cyber Attacks

July 10, 2014 8:51 am | by Jason Brvenik, GCN | Comments

To defeat malware, government agencies need to determine how threats entered a network and where they went once inside. But this relatively simple task is complicated by attackers’ ability to cover their tracks and to do so over an extended period of time.

TOPICS:

Chinese Hackers Seek Info on US Workers

July 10, 2014 8:40 am | by Michael Schmidt, David Sanger and Nicole Perlroth, The New York Times | Comments

Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials. They appeared to be targeting the files on tens of thousands of employees who have applied for top-secret security clearances.

TOPICS:

WVU Establishes Department of Forensic and Investigative Science

July 9, 2014 4:15 pm | by West Virginia Univ. | Comments

Recognizing the growth during the past 20 years of forensic and investigative sciences as a career path, West Virginia University, long a national leader in the field, has established the Department of Forensic and Investigative Science.   

The Science of Fighting Crime

July 9, 2014 3:48 pm | by Jeff Brown, Smyrna-Clayton Sun-Times | Comments

From scouring a child pornographer’s computer hard drive to pulling up invisible fingerprints at a homicide scene or working to identify guns used in a crime, police in Delaware are increasingly using advanced technology to bring criminals to justice.

TOPICS:

DFI Software Helps Croatian Police Solve International Child Abuse Case

July 9, 2014 3:09 pm | Belkasoft | Comments

Digital forensic investigation software was used by Croatian Police to prosecute an international case involving exploitation of children for pornography. During this case, Croatian Police used Belkasoft Evidence Center to extract and analyze information from suspects' computers, memory dumps and hard drive images.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading