The same individual or group claiming to be behind a recent breach of the personal e-mail account of CIA Director John Brennan now claims to be behind the hijacking of the accounts of Director of National Intelligence James Clapper.
It is the largest ever systematic identification effort; only the identification of more than 20,000 victims of armed conflicts in Bosnia and Herzegovina during the 1990s comes close.
There are practical and realistic scenarios where a more proactive approach to gathering digital evidence can ease tension during forensic/incident response activities. But what is often overlooked in these situations is the need to supplement the data content with relevant context.
The FBI zeroed in on a woman suspected in jewelry store robberies across the South after analyzing records from cellphone towers near the robberies, then checking social media.
Security teams must go on the offense and create an environment that provides continuous real-time detection against an ever-changing landscape of cyber threats, and deception tools can play a critical role.
As the sensitivity of DNA analysis increases, scientists are able to develop profiles from ever-smaller samples of DNA
The victim didn't want to proceed with the investigation. But what if she later learns the DNA from her assault matched that of another?
A forensics expert is watching developments around the Netflix true-crime mega-hit "Making a Murderer" with more interest than most: Dr. Scott Fairgrieve testified for the defense during the 2007 trial.
A unique program in Texas is allowing fire investigators to better understand fire deaths.
The Dutch government has released a statement in which it says that "it is currently not desirable to take restricting legal measures concerning the development, availability and use of encryption within the Netherlands."
Nine months after DNA testing was suspended at the District's independent crime lab, officials said evidence analysis will resume in January following a training and management overhaul.
Highly destructive malware that infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week.
The new DNA database in Ireland is up and running, and producing some very significant results.
In 2015, government surveillance marched on in both large (the National Security Agency) and small (the debut of open source license plate reader software) ways. But what will 2016 have in store for the NSA?