All states should have laws ensuring that criminal justice systems properly handle, store and retain forensic biological evidence, according to a new report from the National Institute of Standards and Technology (NIST).
About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research.
The shooting death spawned a SWAT standoff just around the corner at a home in the 13200 block of Earl Avenue. Investigators said they had reason to believe that home and the people inside may have been connected to the Cosbey Street shooting.
The lawsuit, filed in late 2010 by Mejia's mother, Christina Mejia, and other relatives, alleges that responding sheriff's officers removed Mejia's clothes in violation of the department's own rules and took multiple nude photographs of her body. It alleges that the sheriff's office intentionally caused emotional distress to Mejia's family by shooting the photos.
United Airlines stopped a prominent security researcher from boarding a California-bound flight late Saturday, following a social media post by the researcher days earlier suggesting the airline's onboard systems could be hacked.
At a time when the Pentagon arguably is losing a battle with industry for top tech talent, the Army is offering companies the resumes of its best cyber warriors.
Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.
Cyber crime has become as big a threat to Europe's security as terrorism, the head of the continent's policing agency has warned.
An APT campaign has been detected that exploits zero-day vulnerabilities in Adobe Flash and Microsoft Windows. Adobe patched vulnerability CVE-2015-3043 previously, but the Windows vulnerability is new. Security firm FireEye says that the group responsible for the attack is APT28.
A lesser known piece of that macabre history is the estimated 2 million or more who died, often slowly and agonizingly, one bullet at a time, at the hands of the Einsatzgruppen, the Ordnungspolizei and others.
According to the Post, "Of 28 examiners with the FBI Laboratory’s microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far." It is noteworthy that no representatives of the Department of Justice, including the FBI, are quoted in the Post's article.
County and local police departments throughout New Jersey are employing technology to track shell casings from firearms in hopes of solving crimes.
The next generation of cyber attacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.
Breaking from decades of "Just Say No"-type messaging about marijuana use, Colorado law enforcement officials are starting a new campaign designed to promote safe marijuana use.
The forensic science research and development (R&D) conducted decades ago is having an impact in crime laboratories today. In crime labs across the U.S., scientists are being armed with increasingly sophisticated technologies to help bring criminals to justice and protect the innocent.