The Challenge of Authenticating Real Humans in a Digital World
This increasing dependence on digital authentication may actually result in less security. While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses. It may be more convenient, and even more secure,...
Read moreBiometrics to Replace PIN Code in Nigeria
The Central Bank of Nigeria (CBN) has disclosed that with the Bank Verification Number (BVN) in place, biometrics will soon be used for transactions on the Automated Teller Machine (ATM) instead of the existing pin code. The 2017 verification...
Read moreHomeland Security bulletin warns of weaponized drones and threat to aviation
The Department of Homeland Security (DHS) issued an updated terror bulletin on Thursday highlighting the threat of weaponized drones, chemical attacks and the continued targeting of commercial aircraft. “We continue to face one of the most challenging threat environments...
Read moreGame of Drones: Mexico’s Cartels Have a Deadly New Weapon
A squad of Federales pulled over the stolen SUV just after dawn on October 20, along Highway 43D near the town of Salamanca in Mexico’s central Guanajuato state. What began as a high-risk felony stop took an even darker...
Read moreThe Pentagon’s IED-Hunters Have a New Target: Drones
A short list of U.S. military outfits that develop tools and techniques to fight enemy drones includes DARPA, the services’ research labs — and now, the group created more than a decade ago to solve the IED problem. Founded in...
Read moreDeceased man’s cellphone sends away alleged dealer
LOWELL — A 24-year-old Lawrence man was sentenced to two years in jail and two years of probation after pleading guilty to drug charges brought as a result of an investigation that used the cell phone of a man...
Read moreFBI unable to break into Texas church gunman’s cellphone
The FBI has been unable to access the phone of the Texas church gunman, officials said Tuesday, voicing their frustration with the tech industry as they try to gather evidence about Devin Kelley‘s motive for killing 26 churchgoers in...
Read morePython Forensics
Course Details The course is taught as an instructor led face to face course. The course is 3 full days. The course can accommodate up to 15 students The course is executed at your facility – eliminating travel for...
Read morePowerShell for Live Investigations and Triage
PowerShell is a Microsoft framework that includes a command shell and a scripting language. PowerShell is typically used by system administrators, IT teams, incident response groups and forensic investigators to investigate unauthorized or even criminal behavior.
Read moreCoroner confirms remains found in car was Morgan Johnson
Morgan Johnson was last seen at a motel on Gateway Blvd. in Plainfield in May 2011. Police found his car Friday submerged in a pond on Perry Road with a body inside. New cell phone forensics technology helped police narrow...
Read more