A collaboration between NIST scientists and colleagues at Los Alamos National Laboratory has resulted in a new kind of sensor that can be used to investigate the telltale isotopic composition of plutonium samples – a critical measurement for nuclear non-proliferation efforts and related forensics, as well as environmental monitoring, medical assays, and industrial safety.
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
They call him "The Black Cloud." Acting Sgt. Marc Levesque earned the nickname early in his career as a forensic identification officer after he investigated a different death for 28 consecutive shifts.
After having "rediscovered" the usefulness of MS Office macros, malware peddlers have been ramping up email spam runs delivering documents that request users to enable them.
The family of a Tulsa man who shot himself Saturday night in Keystone, Colorado is blaming his suicide on his ingestion of edible marijuana candies.
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.
Almost half of Android smartphones are vulnerable to being hacked through third-party apps downloaded from stores outside the official outlet.
They use screen aliases like IS Hunting Club, TouchMyTweets and The Doctor. They troll Twitter for suspected accounts of Islamic State fighters, recruiters and fund-raisers. Then they pounce.
Xiaoyu Alan Zheng and Ted Vorburger of PML’s Semiconductor and Dimensional Metrology Division were appointed to the Organization of Scientific Area Committees’ (OSAC) Subcommittee on Firearms and Toolmarks, part of an initiative by NIST and the Department of Justice to strengthen forensic science in the United States.
Cockpit voice recordings and, hopefully, flight data will provide the main clues to investigators trying to understand what caused Germanwings Flight 9525 to crash. But that is just the beginning.
When faced with a data breach, the first order of business for companies is to find out what happened, and then how it happened and who did it. To aid in the process, which is unfortunately no longer a rare scenario, ISACA has issued a new set of guidelines that outline the digital forensics process and identify the key steps for organizations to consider when dealing with attacks.
U.S. intelligence agencies in June will stop bulk collection of data documenting calls by U.S. telephone subscribers, unless Congress extends a law authorizing the spying, U.S. officials said.
Italy's high court took up the appeal of Amanda Knox's murder conviction Wednesday, considering the fate of the "very worried" American and her Italian former boyfriend in the brutal 2007 murder of Knox's British roommate. A decision had been expected as early as Wednesday, but with a full caseload Wednesday and other court matters Thursday, the presiding judge said a ruling may not come down until Friday.
House intelligence committee leaders unveiled a bipartisan cybersecurity bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.
The Army says it's investigating an Islamic State group call to harm U.S. troops at home. The militant organization occupying parts of Iraq and Syria reportedly posted the names, photos and home addresses of 100 American service members accused of participating in bombing missions against it.