Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

More Than $100K Needed for Test to ID Identical Twin Rapist

June 3, 2015 1:19 pm | by Ken Kolker, WWLP.com | Comments

Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

TOPICS:
When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a mes

The Dark Web Drug Lords Who Got Away

June 3, 2015 11:06 am | by Andy Greenberg, Wired | Comments

When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a message to any would-be online drug kingpins who might follow in his footsteps.

TOPICS:
GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

Assume Your GitHub Account is Hacked, Users With Weak Crypto Keys Told

June 3, 2015 10:43 am | by Dan Goodin, Ars Technica | Comments

GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

TOPICS:
Advertisement
President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval

Obama Signs Bill Remaking NSA Phone Records Program

June 3, 2015 10:15 am | by The Associated Press | Comments

President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval.

TOPICS:

No Funding for DA’s Police Misconduct Task Force

June 2, 2015 2:00 pm | by Alex Emslie, KQED | Comments

The district attorney’s office requested funding for several efforts, including $383,315 to pay for a task force investigating misconduct in the San Francisco police and sheriff departments.

TOPICS:

After Years of Forensic Investigation, Somerton Man's Identity Remains a Mystery

June 2, 2015 1:56 pm | by Lisa Zyga, Phys.org | Comments

As one of Australia's most infamous cold case mysteries, the enigma of the Somerton Man deals with a haunting situation: a man is found dead on a beach, and no one steps forward to identify him.

TOPICS:

New Sensing Tech Could Help Detect Chemical Weapons, Fraudulent Art

June 2, 2015 1:45 pm | by Cory Nealon, University at Buffalo | Comments

From airport security detecting explosives to art historians authenticating paintings, society’s thirst for powerful sensors is growing.

TOPICS:
The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with pl

NSA Phone Collection Bill Clears Senate Hurdle

June 2, 2015 12:07 pm | by Ken Dilanian, Associated Press | Comments

The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with planned changes to a House version.

TOPICS:
Advertisement
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

New Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

June 2, 2015 10:48 am | by Dan Goodin, Ars Technica | Comments

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

TOPICS:
Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective wh

Combat Wounded Marine Sees New Horrors in Role As Child Porn Hunter

June 2, 2015 10:31 am | by Howard Altman, Tampa Tribune | Comments

Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective who brought in a phone from a recent homicide case. It will be up to Gaertner, a computer forensics analyst, to sift through the data hidden on the phone to come up with evidence.

TOPICS:
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

Hiding Exploit Code in Images

June 2, 2015 10:16 am | by Zeljka Zorz, Help Net Security | Comments

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

TOPICS:
The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday.

IRS Needs to Do More to Fight Cyber Attacks, Watchdog Says

June 2, 2015 9:33 am | by Stephen Ohlemacher, Associated Press | Comments

The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday. The agency's inspector general outlined the security weaknesses a week after the IRS announced that criminals had stolen the personal information of 104,000 taxpayers from an IRS website. 

TOPICS:

Homicide Count for May in Baltimore Rises to 43

June 1, 2015 1:47 pm | by The Associated Press | Comments

Three fatal shootings in Baltimore on Sunday bring May's homicide count to 43, making it the most violent month in more than 40 years.

TOPICS:
Personal information of some 1.25 million of Japan's pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension Service's computer systems.

Hackers Stole Personal Info of Over a Million of Japanese Retirees

June 1, 2015 1:42 pm | by Zeljka Zorz, Help Net Security | Comments

Personal information of some 1.25 million of Japan's pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension Service's computer systems.

TOPICS:
If someone has been mugged, there's a mugger to catch. If a car is stolen, there'll be a thief to find. If a bank is robbed, there will be a robber to track down. And cyber crime? Not so much.

Attacking Cyber Crime Through Infrastructure, Not Individuals

June 1, 2015 1:34 pm | by BBC | Comments

If someone has been mugged, there's a mugger to catch. If a car is stolen, there'll be a thief to find. If a bank is robbed, there will be a robber to track down. And cyber crime? Not so much.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading