February 2, 2016
Via: Security WeekResearchers at Kaspersky Lab have discovered a Linux backdoor that has been migrated to Windows and added a series of new capabilities. The malware was initially spotted on Linux systems, where it had a full set of features that allowed […]
November 23, 2015
Via: CIOAn analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]
November 13, 2015
Via: SC MagazineThe Tor Project is alleging that the Federal Bureau of Investigation (FBI) paid Carnegie Mellon University (CMU) researchers $1 million to attack Tor’s hidden services last year. The attack appears to have indiscriminately targeted several users at once and not […]
November 3, 2015
Via: Help Net SecurityResearchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to “see” what a person is doing and track his or her movement even if that person is located behind a wall, and […]
October 20, 2015
Via: hackerThe hardware-based encryption built into popular #western digital external hard disk drives has flaws that could allow attackers to recover data without knowing the user password. A team of three security #researchers investigated how the #self-encryption feature was implemented in […]
October 11, 2015
Via: vulnerabilitiesIn as little as three short months, the #sha-1 internet #security standard used for digital signatures and set to be phased out by January 2017, could be broken by motivated hackers, a team of international #researchers found, prompting security specialists […]
October 8, 2015
Via: vulnerabilitiesThe #sha-1 #security standard, widely used in digital certificates, electronic banking, browsers, and other applications is weaker than previously thought and susceptible to attacks that are now well within the resources of criminal groups, an international team of cryptanalysts warned […]
October 6, 2015
Via: malware#researchers took a big step towards eradicating the #angler exploit kit, disrupting a large #ransomware campaign connected to it that purportedly netted a hacker more than $30 million annually. According to a report published today, experts with #cisco’s Talos Security […]
October 4, 2015
Via: hackerRegulatory agencies are trying to use copyright law to crack down on dangerous tampering with automobile computers, sparking fears that they will stymie needed cyber-#security research. As Internet-connected cars proliferate on the roads, so too do the opportunities for hackers […]
September 28, 2015
Via: vulnerabilities#truecrypt may be a fond memory for most of its users, but that hasn’t stopped #researchers and hackers from poking about the open source encryption software. Recently, researchers from #google’s #project zero team uncovered a pair of elevation of privilege […]
September 14, 2015
Via: vulnerabilities#researchers recently discovered a smattering of #vulnerabilities in web applications and mobile applications belonging to companies like #yahoo, #paypal, #magento, and Shopify that could have led to account theft, session hijacking, and phishing, among other consequences. Hadji Samir, Ebrahim Hegazy, […]
August 19, 2015
Via: vulnerabilitiesBreaking hypervisor isolation and attacking — or exploiting — neighboring virtual machines is a prominent goal of cyber criminals. At the Black Hat USA 2015 and DEF CON 23 conferences, a group of Intel Security researchers from the Advanced Threat […]
July 29, 2015
Via: privacy-protectionSecurity researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor. The researchers, according to Ars Technica, have successfully created a site that can profile […]
July 17, 2015
Via: vulnerabilitiesA group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute successful drive-by download attacks. “The explosive growth of malware is continuously fueled by […]
July 6, 2015
Via: network-securityResearchers at the University of London and the University of Rome felt VPN service providers’ claims about advantages of using their services, such as online anonymity, censorship avoidance, and protection from tracking/monitoring, have not received enough scrutiny. So, the academics […]
June 30, 2015
Via: network-securityVirtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe the companies’ claims that they offer privacy and anonymity. A group of researchers from the Sapienza University […]
June 18, 2015
Via: network-securityLinkedIn plans to continue closely vetting researchers for its bug bounty rewards program, saying it reduces the number of distracting erroneous and irrelevant reports. The decision to keep its program private “gives our strong internal application security team the ability […]
March 12, 2015
Via: network-security#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in #chip #design. The work builds on a paper published last year […]