Advertisement
Top

Tag: Researchers


Access control

Tough Challenges in Cybersecurity Ethics

October 13, 2016

Via: Security Intelligence

Ethics — moral principles that govern a person’s behavior — is a critical part of any sound cyber-security defense strategy. Without clear ethical standards and rules, cyber-security professionals are almost indistinguishable from the black-hat criminals against whom they seek to […]


Access control

5 ways to improve voting security in the US

October 6, 2016

Via: InfoWorld

With the U.S. presidential election just weeks away, questions about election security continue to dog the nation’s voting system.  It’s too late for election officials to make major improvements, “and there are no resources,” said Joe Kiniry, a long-time election […]


Network security

DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

October 3, 2016

Via: Security Affairs

Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of security researchers at the Princeton University, Karlstad University and KTH Royal […]


Vulnerabilities

Multiple Smart Components Are Vulnerable to Cyber Attacks

September 19, 2016

Via: InfoSecurity Live

Kaspersky Lab researchers examined a number of digital kiosks and interactive terminals used in modern cities for different purposes – from paying for different services through to entertainment – and discovered that a lot of them contain vulnerabilities that can […]


Mobile, Mobile security

Researchers find seven classes of vulnerabilities in iOS sandbox security feature

August 26, 2016

Via: SC Magazine

Researchers across three universities have discovered seven classes of vulnerabilities in the sandboxing feature of Apple’s iOS operating system, which if exploited could allow malicious actors to launch a bevy of attacks that would place an iPhone or iPad user’s […]


Access control

Cards with chips are still vulnerable

August 18, 2016

Via: Kaspersky Blog

The banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart chips and one-time passwords stand guard between your money and […]


Wireless security

Millions of Cars Vulnerable to Remote Unlocking Hack

August 12, 2016

Via: Security Week

Researchers have disclosed two remote keyless system attack methods that can be exploited by thieves to clone entry remotes and unlock millions of cars worldwide. The fact that various functions of a moving car can be hijacked by a hacker […]


Vulnerabilities

Researchers crack Microsoft feature, say encryption backdoors similarly crackable

August 11, 2016

Via: The Hill

Researchers who uncovered a security key that protects Windows devices as they boot up say their discovery is proof that encryption backdoors do not work. The pair of researchers, credited by their hacker nicknames MY123 and Slipstream, found the cryptographic […]


Malware

Attackers Disguise Macro Malware by Renaming Files

August 4, 2016

Via: Security Week

Malware operators can hide the use of malicious macros to distribute malware by simply renaming the offending Office documents, Cisco researchers reveal. Microsoft switched macros off by default in 2007, and also introduced new file formats that no longer supported […]


Vulnerabilities, Wireless security

50+ vulnerabilities found in popular home gateway modems/routers

July 27, 2016

Via: Help Net Security

Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by Hungarian Cable TV operator UPC Magyarország, but also by many ISPs around the world. The devices in question […]


Cyber warfare, Mobile security

Three topics everyone will be talking about at Black Hat USA 2016

July 21, 2016

Via: Help Net Security

There has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding with nation-state threat actors and concerns over consumer privacy. All of these […]


Privacy protection

Riffle: A new anonymity system to rival Tor

July 15, 2016

Via: Help Net Security

A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation efficient, as well as less susceptible to traffic analysis attacks than […]


Access control, Hacker, Mobile security

Hacking smartphones via voice commands hidden in YouTube videos

July 12, 2016

Via: Help Net Security

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones. In order for the attack to work, the target smartphones have to […]


Network security, Privacy protection

Researchers tout new anonymity network

July 12, 2016

Via: The Hill

Researchers have developed a network architecture they claim is a dramatically more efficient way for users to interact anonymously. Researchers from the Massachusetts Institute of Technology and the Swiss École Polytechnique Fédérale de Lausanne collaborated on the project, known as “Riffle […]


Vulnerabilities

Exfiltrating data from air-gapped computers by modulating fan speed

June 27, 2016

Via: Help Net Security

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates […]


Malware

Large Botnet Comes Back To Life — With More Malware

June 24, 2016

Via: Dark Reading

The Necurs botnet associated with Dridex and Locky is back after three-week haitus. A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent months has resumed operations after mysteriously going dark for three weeks. Researchers from […]


Data loss

Researchers Devise “Perfect” Data Exfiltration Technique

May 31, 2016

Via: Security Week

SafeBreach researchers set out in 2015 to find the perfect method for stealing small amounts of sensitive data from highly secure organizations. While malicious actors often exfiltrate gigabytes of files from the companies they breach, key pieces of information can […]


Wireless security

Nissan Disables LEAF’s Remote Telematics System After ‘Profoundly Trivial’ Hack

February 26, 2016

Via: Dark Reading

All that is needed to gain access to any LEAF’s telematics system is the car’s VIN, researcher says. Automaker Nissan Motor Company has temporarily disabled a remote telematics system in its LEAF electric vehicles after a security researcher showed how […]


Application security

Skype targeted by T9000 backdoor trojan

February 9, 2016

Via: SC Magazine

Palo Alto Networks researchers spotted a new, more complex backdoor trojan that is targeting Skype users, and which can identify and evade the security software found on the victim’s computer. Palo Alto’s Josh Grunzweig and Jen Miller-Osborn, part of the […]


Vulnerabilities

Security flaws discovered in smart toys and kids' watches

February 4, 2016

Via: Help Net Security

Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact with children and can be monitored via a mobile app and WiFi connectivity, and The […]