Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-p

Getting a Critical Edge on Plutonium Identification

March 27, 2015 8:27 am | by NIST | Comments

A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.

TOPICS:
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create

Mathematicians Redesign Encrytion Code to Thwart Cyber Attacks

March 27, 2015 8:27 am | by Rebecca Phillips, Washington State University | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

TOPICS:
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

Inside the Ottawa Police Forensics Lab

March 26, 2015 1:13 pm | by Judy Trinh, CBC News | Comments

They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.

TOPICS:
Advertisement
After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them.

Macro-Based Malware Continues to Gain Traction

March 26, 2015 12:30 pm | by Zeljka Zorn, Help Net Security | Comments

After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them. 

TOPICS:
The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

Marijuana Edibles Blamed for Colorado Death

March 26, 2015 11:38 am | by Brian Maass, CBS Denver | Comments

The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.

TOPICS:
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

BitWhisper Puts the Heat on Air-Gapped Computers

March 26, 2015 10:42 am | by Ben-Gurion University of the Negev | Comments

Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.

TOPICS:
Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

Android Apps Vulnerable to Hijacking

March 26, 2015 10:22 am | by Ernie Austin, Associate Editor | Comments

Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.

TOPICS:
They use screen aliases like IS Hunting Club, TouchMyTweets and The Doctor. They troll Twitter for suspected accounts of Islamic State fighters, recruiters and fund-raisers. Then they pounce.

Online Vigilantes Battle the Islamic State

March 26, 2015 8:53 am | by Rich Gladstone, The New York Times | Comments

They use screen aliases like IS Hunting Club, TouchMyTweets and The Doctor. They troll Twitter for suspected accounts of Islamic State fighters, recruiters and fund-raisers. Then they pounce.

TOPICS:
Advertisement
Xiaoyu Alan Zheng and Ted Vorburger of PML’s Semiconductor and Dimensional Metrology Division were appointed to the Organization of Scientific Area Committees’ (OSAC) Subcommittee on Firearms and Toolmarks, part of an initiative by NIST and the Department

PML Helps Lead Standardization for Firearm and Toolmark Examinations

March 26, 2015 8:52 am | by NIST | Comments

Xiaoyu Alan Zheng and Ted Vorburger of PML’s Semiconductor and Dimensional Metrology Division were appointed to the Organization of Scientific Area Committees’ (OSAC) Subcommittee on Firearms and Toolmarks, part of an initiative by NIST and the Department of Justice to strengthen forensic science in the United States.

TOPICS:
Cockpit voice recordings and, hopefully, flight data will provide the main clues to investigators trying to understand what caused Germanwings Flight 9525 to crash. But that is just the beginning.

How Investigators Will Determine Why Germanwings Jet Crashed

March 26, 2015 8:50 am | by Scott Mayerowitz, Associated Press | Comments

Cockpit voice recordings and, hopefully, flight data will provide the main clues to investigators trying to understand what caused Germanwings Flight 9525 to crash. But that is just the beginning.

TOPICS:
out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organiz

ISACA Lays Out Forensics for the Data Breach Era

March 25, 2015 12:27 pm | by Tara Seals, Infosecurity Magazine | Comments

When faced with a data breach, the first order of business for companies is to find out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations to consider when dealing with attacks.

TOPICS:
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

US to Stop Collecting Bulk Phone Data if Congress Lets Law Expire

March 25, 2015 12:14 pm | by Mark Hosenball, Reuters | Comments

U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.

TOPICS:
Italy's high court took up the appeal of Amanda Knox's murder conviction Wednesday, considering the fate of the "very worried" American and her Italian former boyfriend in the brutal 2007 murder of Knox's British roommate. A decision had been expected as

Italy High Court Deciding Fate of 'Very Worried' Amanda Knox

March 25, 2015 10:59 am | by Colleen Barry and Frances D'Emilio, Associated Press | Comments

Italy's high court took up the appeal of Amanda Knox's murder conviction Wednesday, considering the fate of the "very worried" American and her Italian former boyfriend in the brutal 2007 murder of Knox's British roommate. A decision had been expected as early as Wednesday, but with a full caseload Wednesday and other court matters Thursday, the presiding judge said a ruling may not come down until Friday.

TOPICS:
House intelligence committee leaders unveiled a bipartisan cybersecurity bill Tuesday amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of

House Unveils Cyber Bill and Signals Bipartisan Compromise

March 25, 2015 10:39 am | by Ken Dilanian, Associated Press | Comments

House intelligence committee leaders unveiled a bipartisan cybersecurity bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

TOPICS:
The Army says it's investigating an Islamic State group call to harm U.S. troops at home. The militant organization occupying parts of Iraq and Syria reportedly posted the names, photos and home addresses of 100 American service members accused of partici

Army Investigating Islamic State Threats

March 25, 2015 10:28 am | by Kyle Jahner, Army Times | Comments

The Army says it's investigating an Islamic State group call to harm U.S. troops at home. The militant organization occupying parts of Iraq and Syria reportedly posted the names, photos and home addresses of 100 American service members accused of participating in bombing missions against it.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading