Researchers see gathering of cyber-storm clouds in botnet
20 hours ago
Security people at Check Point Research have warned us and it is not very pretty. A new Internet of Things botnet storm is in the wings. The team turned up the siren on October 19, warning of a botnet targeting IoT (Internet ...
For $1000, anyone can purchase online ads to track your location and app use
Oct 18, 2017
Privacy concerns have long swirled around how much information online advertising networks collect about people's browsing, buying and social media habits—typically to sell you something.
Hackers locking Mac machines demand ransom
Sep 26, 2017
(Tech Xplore)—Find My device is a service indeed—not only to Apple device owners but, guess who, to hackers.
Goodbye, login. Hello, heart scan.
Sep 25, 2017
Forget fingerprint computer identification or retinal scanning. A University at Buffalo-led team has developed a computer security system using the dimensions of your heart as your identifier.
Apache vulnerability is reported
Sep 21, 2017
(Tech Xplore)—The Fuzzing Project blog this week carried a report we really do not like to hear but must know about regardless. Another "bleed" has been discovered. A bug in the Apache Web Server may result in contents ...
Real or fake? Creating fingers to protect identities
Sep 20, 2017
Do you know how safe it is to use your finger as a security login? And have you wondered how your cell phone knows if your finger is real or a fake?
Privacy streams helps developers create privacy friendly apps
Sep 13, 2017
A smartphone app that uses the raw feed from the device's microphone or accesses its contact list can raise red flags for a user concerned about privacy. In many cases, however, the app doesn't need all the details that users ...
Bluetooth: It's complicated. Armis Labs researchers see pitfalls
Sep 13, 2017
(Tech Xplore)—If you ask two researchers what is the problem with Bluetooth they will have a simple answer.
Researchers explore inaudible voice command attack
Sep 08, 2017
(Tech Xplore)—The novelty has worn off; we are now quite accustomed to the technology advances leveraged by leading vendors that allow the daily use of human-device interactions via voice.
Approach enables experts to look beyond IP in cyber security investigations
Sep 05, 2017
A technique which enables digital forensic investigators to assess an individual's internet use rather than simply focusing on traffic using Internet Protocol (IP) addresses has been developed by cyber security experts at ...