Microsoft patches document exploit vulnerability
Apr 12, 2017
(Tech Xplore)—Many malware stories take the same story line, spread when computer victims open email attachments that enable installation of malware on their devices.
So you think you can secure your mobile phone with a fingerprint?
Apr 11, 2017
No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that partial similarities ...
Honeypot reveals BrickerBot attacks: Internet of Things device wipeout
Apr 10, 2017
(Tech Xplore)—A new type of malware rendering Internet of Things devices useless is making a lot of security watchers simply scratch their heads. They know how the attacks are taking place; they just cannot figure out why.
Researcher at security event shows smart TV attack
Apr 03, 2017
(Tech Xplore)—Smart TVs vulnerable to hacks? That is no longer a question but an answer, for researcher Rafael Scheel, with Oneconsult, a cyber security consulting company.
The next cyberattack could come from sound waves
Mar 28, 2017
You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from "side-channel" attacks, where an intruder can bypass ...
Sonic cyber attack shows security holes in ubiquitous sensors
Mar 14, 2017
Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things, University of Michigan research shows.
Once overlooked, uninitialized-use 'bugs' may provide portal for hacker attacks on Linux
Mar 02, 2017
Popular with programmers the world over for its stability, flexibilityand security, Linux now appears to be vulnerable to hackers.
Kaspersky Lab researchers pick apart risky nature of some mobile apps for connected cars
Feb 20, 2017
(Tech Xplore)—A mobile device app shown as vulnerable to hack story. Yawn. But what if the hacks are being used to steal your car? Wake up call.
Simulated ransomware attack shows vulnerability of industrial controls
Feb 13, 2017
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable ...
Your 'anonmyized' web browsing history may not be anonymous
Jan 19, 2017
Raising further questions about privacy on the internet, researchers from Princeton and Stanford universities have released a study showing that a specific person's online behavior can be identified by linking anonymous web ...