Advertisement
 
News
Subscribe to Forensic Magazine
View Sample

SUBSCRIBE TO FREE
Forensic Magazine
EMAIL NEWSLETTER

If the cryptographic analysis reaches a dead end, the question of the Somerton Man's identity can also be approached by testing his DNA and comparing it to that of millions of other individuals on genealogical databases.

Somerton Man's Identity Still Remains a Mystery: DNA, Isotopes and Autopsy

June 3, 2015 2:53 pm | by Lisa Zyga, Phys.org | Comments

If the cryptographic analysis reaches a dead end, the question of the Somerton Man's identity can also be approached by testing his DNA and comparing it to that of millions of other individuals on genealogical databases.

TOPICS:
Police often use DNA to solve murder mysteries and rapes. But last year, they used it to determine who spit into a customer's soda at a Chili's restaurant in Clay, New York.

Customer Suspects Annoyed Waiter Spit in Soda; Police Use DNA to Prove It

June 3, 2015 2:25 pm | by John O'Brien, syracuse.com | Comments

Police often use DNA to solve murder mysteries and rapes. But last year, they used it to determine who spit into a customer's soda at a Chili's restaurant in Clay, New York.

TOPICS:
Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

More Than $100K Needed for Test to ID Identical Twin Rapist

June 3, 2015 1:19 pm | by Ken Kolker, WWLP.com | Comments

Police say a cutting-edge DNA test could identify which identical twin was the stranger who raped a student 16 years ago in downtown Grand Rapids, Michigan, but sticker shock is delaying justice.

TOPICS:
Advertisement
When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a mes

The Dark Web Drug Lords Who Got Away

June 3, 2015 11:06 am | by Andy Greenberg, Wired | Comments

When Ross Ulbricht was sentenced to life in prison without parole, the judge in his case made clear that her severe punishment wasn’t only about Ulbricht’s personal actions in creating the Silk Road’s billion-dollar drug market. She was also sending a message to any would-be online drug kingpins who might follow in his footsteps.

TOPICS:
GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

Assume Your GitHub Account is Hacked, Users With Weak Crypto Keys Told

June 3, 2015 10:43 am | by Dan Goodin, Ars Technica | Comments

GitHub has revoked an unknown number of cryptographic keys used to access accounts after a developer found they contained a catastrophic weakness that came to light some seven years ago.

TOPICS:
President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval

Obama Signs Bill Remaking NSA Phone Records Program

June 3, 2015 10:15 am | by The Associated Press | Comments

President Barack Obama has signed legislation reviving and reshaping surveillance laws that expired temporarily Sunday night. The White House says Obama signed the bill late Tuesday evening, hours after the Senate gave its final approval.

TOPICS:

No Funding for DA’s Police Misconduct Task Force

June 2, 2015 2:00 pm | by Alex Emslie, KQED | Comments

The district attorney’s office requested funding for several efforts, including $383,315 to pay for a task force investigating misconduct in the San Francisco police and sheriff departments.

TOPICS:

After Years of Forensic Investigation, Somerton Man's Identity Remains a Mystery

June 2, 2015 1:56 pm | by Lisa Zyga, Phys.org | Comments

As one of Australia's most infamous cold case mysteries, the enigma of the Somerton Man deals with a haunting situation: a man is found dead on a beach, and no one steps forward to identify him.

TOPICS:
Advertisement

New Sensing Tech Could Help Detect Chemical Weapons, Fraudulent Art

June 2, 2015 1:45 pm | by Cory Nealon, University at Buffalo | Comments

From airport security detecting explosives to art historians authenticating paintings, society’s thirst for powerful sensors is growing.

TOPICS:
The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with pl

NSA Phone Collection Bill Clears Senate Hurdle

June 2, 2015 12:07 pm | by Ken Dilanian, Associated Press | Comments

The Senate sped toward passage Tuesday of legislation to end the National Security Agency's collection of Americans' calling records while preserving other surveillance authorities. But House leaders warned their Senate counterparts not to proceed with planned changes to a House version.

TOPICS:
Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

New Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

June 2, 2015 10:48 am | by Dan Goodin, Ars Technica | Comments

Macs older than a year are vulnerable to exploits that remotely overwrite the firmware that boots up the machine, a feat that allows attackers to control vulnerable devices from the very first instruction.

TOPICS:
Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective wh

Combat Wounded Marine Sees New Horrors in Role As Child Porn Hunter

June 2, 2015 10:31 am | by Howard Altman, Tampa Tribune | Comments

Sitting in his wheelchair in the cramped but neat cubicle in the headquarters of the U.S. Immigration and Customs Enforcement's Homeland Security Investigations, Justin Gaertner explains the basics of computer forensics to a Clearwater police detective who brought in a phone from a recent homicide case. It will be up to Gaertner, a computer forensics analyst, to sift through the data hidden on the phone to come up with evidence.

TOPICS:
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

Hiding Exploit Code in Images

June 2, 2015 10:16 am | by Zeljka Zorz, Help Net Security | Comments

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated that it's possible.

TOPICS:
The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday.

IRS Needs to Do More to Fight Cyber Attacks, Watchdog Says

June 2, 2015 9:33 am | by Stephen Ohlemacher, Associated Press | Comments

The IRS has failed to implement dozens of security upgrades to combat cyberattacks, leaving the agency's computer systems vulnerable to hackers, a government watchdog told Congress Tuesday. The agency's inspector general outlined the security weaknesses a week after the IRS announced that criminals had stolen the personal information of 104,000 taxpayers from an IRS website. 

TOPICS:

Homicide Count for May in Baltimore Rises to 43

June 1, 2015 1:47 pm | by The Associated Press | Comments

Three fatal shootings in Baltimore on Sunday bring May's homicide count to 43, making it the most violent month in more than 40 years.

TOPICS:

Pages

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading