research
Should you risk buying your child smart toys currently on offer?
As the end-of-the-year holiday season approaches, many security researchers, consumer groups and even governments warn against buying specific products or, at least, to make …
Sites using session replay scripts leak sensitive user data
When we enter sensitive information – our names, passwords, payment card information, medical information, what have you – into websites, we do it with the …
Phishing is a greater threat to users than keyloggers and third-party breaches
When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …
Researchers analyze 3,200 unique phishing kits
Most phishing sites are quickly detected and access to them is blocked, but not matter how fast the “takedown” happens, the number of victims is still large enough …
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device
Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks
A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …
WPA2 weakness allows attackers to extract sensitive info from Wi-Fi traffic
WPA2, a protocol that secures modern protected Wi-Fi networks, sports serious weaknesses that can allow attackers to read and capture information that users believe to be …
The privacy implications of email tracking
Emails are a widely used means for third parties to tie your email address to your activities across the web, Princeton University researchers have discovered. The extent of …
Secure coding in Java: Bad online advice and confusing APIs
For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not …
After hack, security researchers probe Deloitte’s security posture
It’s difficult – if not impossible – for any organization to keep their networks and systems completely safe from knowledgeable, well-resourced and …
Android unlock patterns are a boon for shoulder surfing attackers
The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …
Using security cameras and infrared light to extract data from air-gapped networks
Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light …