Advertisement
Top

Tag: Researchers


Malware, Vulnerabilities

New Cross-Platform Backdoors Target Linux, Windows

February 2, 2016

Via: Security Week

Researchers at Kaspersky Lab have discovered a Linux backdoor that has been migrated to Windows and added a series of new capabilities. The malware was initially spotted on Linux systems, where it had a full set of features that allowed […]


Vulnerabilities

Many embedded devices ship without adequate security tests, analysis shows

November 23, 2015

Via: CIO

An analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]


Privacy protection

Tor alleges FBI paid Carnegie Mellon $1M to hack hidden services

November 13, 2015

Via: SC Magazine

The Tor Project is alleging that the Federal Bureau of Investigation (FBI) paid Carnegie Mellon University (CMU) researchers $1 million to attack Tor’s hidden services last year. The attack appears to have indiscriminately targeted several users at once and not […]


Security

Researchers can identify people through walls by using wireless signals

November 3, 2015

Via: Help Net Security

Researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to “see” what a person is doing and track his or her movement even if that person is located behind a wall, and […]


Hacker

Western Digital self-encrypting external hard disk drives have flaws that can expose data

October 20, 2015

Via: hacker

The hardware-based encryption built into popular #western digital external hard disk drives has flaws that could allow attackers to recover data without knowing the user password. A team of three security #researchers investigated how the #self-encryption feature was implemented in […]


Vulnerabilities

Researchers say SHA-1 will soon be broken, urge migration to SHA-2

October 11, 2015

Via: vulnerabilities

In as little as three short months, the #sha-1 internet #security standard used for digital signatures and set to be phased out by January 2017, could be broken by motivated hackers, a team of international #researchers found, prompting security specialists […]


Vulnerabilities

Researchers Warn Against Continuing Use Of SHA-1 Crypto Standard

October 8, 2015

Via: vulnerabilities

The #sha-1 #security standard, widely used in digital certificates, electronic banking, browsers, and other applications is weaker than previously thought and susceptible to attacks that are now well within the resources of criminal groups, an international team of cryptanalysts warned […]


Malware

Researchers Disrupt Angler Exploit Kit Ecosystem, Derail $30M Ransomware Campaign

October 6, 2015

Via: malware

#researchers took a big step towards eradicating the #angler exploit kit, disrupting a large #ransomware campaign connected to it that purportedly netted a hacker more than $30 million annually. According to a report published today, experts with #cisco’s Talos Security […]


Hacker

Fear of lawsuits chills car hack research

October 4, 2015

Via: hacker

Regulatory agencies are trying to use copyright law to crack down on dangerous tampering with automobile computers, sparking fears that they will stymie needed cyber-#security research. As Internet-connected cars proliferate on the roads, so too do the opportunities for hackers […]


Vulnerabilities

VeraCrypt Patched Against Two Critical TrueCrypt Flaws

September 28, 2015

Via: vulnerabilities

#truecrypt may be a fond memory for most of its users, but that hasn’t stopped #researchers and hackers from poking about the open source encryption software. Recently, researchers from #google’s #project zero team uncovered a pair of elevation of privilege […]


Vulnerabilities

Researchers Outline Vulnerabilities in Yahoo, PayPal, Magento Apps

September 14, 2015

Via: vulnerabilities

#researchers recently discovered a smattering of #vulnerabilities in web applications and mobile applications belonging to companies like #yahoo, #paypal, #magento, and Shopify that could have led to account theft, session hijacking, and phishing, among other consequences. Hadji Samir, Ebrahim Hegazy, […]


Vulnerabilities

Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware

August 19, 2015

Via: vulnerabilities

Breaking hypervisor isolation and attacking — or exploiting — neighboring virtual machines is a prominent goal of cyber criminals. At the Black Hat USA 2015 and DEF CON 23 conferences, a group of Intel Security researchers from the Advanced Threat […]


Privacy protection

‘Keystroke Biometrics’ exploit defeats Tor privacy

July 29, 2015

Via: privacy-protection

Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor. The researchers, according to Ars Technica, have successfully created a site that can profile […]


Vulnerabilities

Researchers prove HTML5 can be used to hide malware

July 17, 2015

Via: vulnerabilities

A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute successful drive-by download attacks. “The explosive growth of malware is continuously fueled by […]


Network security

IPv6 security vulnerability pokes holes in VPN providers’ claims

July 6, 2015

Via: network-security

Researchers at the University of London and the University of Rome felt VPN service providers’ claims about advantages of using their services, such as online anonymity, censorship avoidance, and protection from tracking/monitoring, have not received enough scrutiny. So, the academics […]


Network security

Popular VPNs leak data, don’t offer promised privacy and anonymity

June 30, 2015

Via: network-security

Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe the companies’ claims that they offer privacy and anonymity. A group of researchers from the Sapienza University […]


Network security

LinkedIn says private bug bounty program works for it better

June 18, 2015

Via: network-security

LinkedIn plans to continue closely vetting researchers for its bug bounty rewards program, saying it reduces the number of distracting erroneous and irrelevant reports. The decision to keep its program private “gives our strong internal application security team the ability […]


Network security

Google researchers hack computers using DRAM electrical leaks

March 12, 2015

Via: network-security

#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in #chip #design. The work builds on a paper published last year […]