Kaspersky Lab researchers pick apart risky nature of some mobile apps for connected cars
18 hours ago
(Tech Xplore)—A mobile device app shown as vulnerable to hack story. Yawn. But what if the hacks are being used to steal your car? Wake up call.
Simulated ransomware attack shows vulnerability of industrial controls
Feb 13, 2017
Cybersecurity researchers at the Georgia Institute of Technology have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable ...
Your 'anonmyized' web browsing history may not be anonymous
Jan 19, 2017
Raising further questions about privacy on the internet, researchers from Princeton and Stanford universities have released a study showing that a specific person's online behavior can be identified by linking anonymous web ...
Finnish developer shows how browser autofill profiles can be exploited to leak information
Jan 12, 2017
(Tech Xplore)—Some phishing attack. Numerous sites this week have reported the dangers of a phishing attack made possible by the browser you use. The Guardian was one of the sites having a look at how private information ...
Security experts reveal vulnerability with airline reservation systems
Dec 29, 2016
(Tech Xplore)—A pair of researchers with German security firm Security Research Labs has revealed the results of research they undertook to assess the security strength and weaknesses of airline booking systems. Karsten ...
Streamlining the Internet of Things and other cyber-physical systems
Dec 29, 2016
In an Institute of Electrical and Electronics Engineers (IEEE) keynote paper, computer engineers lay out a framework to improve research on cyber-physical systems.
Cryptography: Security engineers announce Project Wycheproof
Dec 21, 2016
(Tech Xplore)—"Many of the algorithms used in cryptography for encryption, decryption, and authentication are complicated, especially when asymmetric, public key cryptography is being used," said Peter Bright on Monday ...
A unique moving target technique combats information leakage attacks
Dec 12, 2016
When it comes to protecting data from cyberattacks, information technology (IT) specialists who defend computer networks face attackers armed with some advantages. For one, while attackers need only find one vulnerability ...
How it takes just six seconds to hack a credit card
Dec 01, 2016
Working out the card number, expiry date and security code of any Visa credit or debit card can take as little as six seconds and uses nothing more than guesswork, new research has shown.
New software continuously scrambles code to foil cyber attacks
Nov 16, 2016
As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief.