Sonic cyber attack shows security holes in ubiquitous sensors
Mar 14, 2017
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things, University of Michigan research shows.
Once overlooked, uninitialized-use 'bugs' may provide portal for hacker attacks on Linux
Mar 02, 2017
Popular with programmers the world over for its stability, flexibilityand security, Linux now appears to be vulnerable to hackers.
Kaspersky Lab researchers pick apart risky nature of some mobile apps for connected cars
Feb 20, 2017
(Tech Xplore)—A mobile device app shown as vulnerable to hack story. Yawn. But what if the hacks are being used to steal your car? Wake up call.
Simulated ransomware attack shows vulnerability of industrial controls
Feb 13, 2017
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable ...
Your 'anonmyized' web browsing history may not be anonymous
Jan 19, 2017
Raising further questions about privacy on the internet, researchers from Princeton and Stanford universities have released a study showing that a specific person's online behavior can be identified by linking anonymous web ...
Finnish developer shows how browser autofill profiles can be exploited to leak information
Jan 12, 2017
(Tech Xplore)—Some phishing attack. Numerous sites this week have reported the dangers of a phishing attack made possible by the browser you use. The Guardian was one of the sites having a look at how private information ...
Security experts reveal vulnerability with airline reservation systems
Dec 29, 2016
(Tech Xplore)—A pair of researchers with German security firm Security Research Labs has revealed the results of research they undertook to assess the security strength and weaknesses of airline booking systems. Karsten ...
Streamlining the Internet of Things and other cyber-physical systems
Dec 29, 2016
In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems.
Cryptography: Security engineers announce Project Wycheproof
Dec 21, 2016
(Tech Xplore)—"Many of the algorithms used in cryptography for encryption, decryption, and authentication are complicated, especially when asymmetric, public key cryptography is being used," said Peter Bright on Monday ...
A unique moving target technique combats information leakage attacks
Dec 12, 2016
When it comes to protecting data from cyberattacks, information technology (IT) specialists who defend computer networks face attackers armed with some advantages. For one, while attackers need only find one vulnerability ...