iPhone 5S fingerprint scanning: Thumbs up or down?

Technology to acquire and use biometric data such as fingerprints has been around for several decades and has made its way from forensic investigation to laptop computers – and now, with this week's introduction of iPhone ...

Computer programs improve fingerprint grading

Subjectivity is problematic when evaluating fingerprints, and quality is in the eye of the examiner. But three computer programs used together can give fingerprint grading unprecedented consistency and objectivity, according ...

Footwear forensics: CSI needs to tread carefully

A new computer algorithm can analyze the footwear marks left at a crime scene according to clusters of footwear types, makes and tread patterns even if the imprint recorded by crime scene investigators is distorted or only ...

Voice software helps study of rare Yosemite owls

In the bird world, they make endangered condors seem almost commonplace. The unique Great Gray Owls of Yosemite, left to evolve after glacial ice separated them from their plentiful Canadian brethren 30 millennia ago, are ...

Apple phones are AES-tough, says forensics expert

(Phys.org) -- Monday's Technology Review carries a glowing tribute to Apple iPhone security according to its author, Simson Garfinkel, a contributing editor who works in computer forensics and is highly regarded as a leader ...

ElcomSoft undoes Apple's location security fix

(PhysOrg.com) -- ElcomSoft, a Russian computer forensics company that first came to the attention of the public in 2002 when it was sued and cleared of violations of the Digital Millennium Copyright Act for its eBook copyright ...

XBox forensics

A forensics toolkit for the Xbox gaming console is described by US researchers in the latest issue of the International Journal of Electronic Security and Digital Forensics. The toolkit could allow law enforcement agencies ...

Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

page 1 from 3