Retail giants aren’t the only target of hackers who infiltrate computer systems to gain access to sensitive information. The federal government also falls victim, such as recently when the Obama administration revealed 21.5 million people were affected by a breach at OPM. Social Security numbers and other records were stolen; likely anyone given a government background check in the last 15 years was affected.
The prosecution of Ethel and Julius Rosenberg is arguably the trial of the last century in America. The married couple from New York were arrested in 1950, convicted of passing atomic secrets to the Soviet Union, and executed by electric chair on June 19, 1953. Now, their surviving children say the newly released testimony given to a grand jury shows Ethel should never have been executed– and she was guilty only in standing by her man.
The trial of a Wood-Ridge man accused of beating a woman to death and setting her body on fire will mark the first time that a jury in New Jersey will consider evidence in a murder case based on a "next generation" test that can analyze the DNA from just a few cells of biological material.
The last few decades have seen numerous exciting technological advances in the forensic sciences. But actually using these new forensic technologies to catch and convict perpetrators and clear the innocent is much more complicated than it looks on TV. This is where social science comes in.
A state-of-the-art forensic laboratory is being constructed on Washburn University’s campus by the Kansas Bureau of Investigation that will provide a 100,000 square foot facility to students and faculty.
The two men suspected of masquerading as police officers to rob an art museum of $500 million worth of masterpieces in 1990 are dead, the FBI says.
They’re the machines that won’t die. In the 1960s many airlines, banks and governments began processing sensitive transactions using giant mainframe computers - and their descendants are still in use. Now it turns out these living dinosaurs of computing also have a very modern vice: they overshare on the Internet.
Claims that technical experts have solved attribution ignore legal challenges that could slow or limit how states might lawfully respond to a major cyber attack.
Following the news of the discovery of the Stagefright flaw - characterized by many security researchers as the worst vulnerability ever to be found on devices that run Google's Android operating system - details of yet another major flaw in were unveiled at the Black Hat conference in Las Vegas.
Vendors who win the job of protecting the identities of 21.5 million victims of the largest known federal data breach will have to let the government inside their own databases, according to new contracting papers.
And you thought dealing with code was hard. You thought you were smart. Well, those security researchers who hack physical systems not only need to know code, they need to know physics and chemistry, plumbing and engineering. Automation tools simply don't exist yet. One good attack may take a year to create. And when an exploit is successful, they can only try to make it look like an accident; not slip away like it never happened at all.
One of the best ways to reduce the cyber threat is to make it harder and more costly for adversaries to initiate attacks, says Defense Department CIO Terry Halvorsen. Powerful and innovative security measures such as multifactor authentication and biometrics, along with strategic security planning and training, could make launching attacks on DoD resources time-consuming and futile.
Pentagon's Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until the threat is dealt with.
"Take dem bullets out the house," the text message read. The text was allegedly sent by Rickey Cummings, a 23-year-old in Waco, Texas. In 2012, Cummings, a suspected Bloods gang member, was sentenced to death for murder in the 2011 shooting deaths of two men. The text, sent one day after the murders, was used as incriminating evidence.
After binding a jewelry store's employees with duct tape last May, two armed robbers drove away from Tanger 1 Outlets with a massive haul. In their getaway car was merchandise worth more than $800,000 from Bluffton's Kay Jewelers. One of the robbers, though, left something just as valuable for investigators - his DNA.