Please turn on your JavaScript for this page to function normally.
windtalker
Researchers reveal WiFi-based mobile password discovery attack

A group of researchers has come up with WindTalker, a new attack method for discovering users’ passwords and PINs as they enter them into their smartphones. WindTalker …

CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

magnify
Signal Protocol’s crypto core has no major flaws, researchers find

A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

3d printing
Hacking 3D manufacturing systems demonstrated by researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a …

Intel CPU
Researchers bypass ASLR by exploiting flaw in Intel chip

Researchers have found a design flaw in the branch predictor, a component of Intel’s Haswell processor, and have exploited it to bypass ASLR (Address Space Layout …

OverSight
OverSight detects when Mac malware uses built-in camera, mic

Users who want to be warned each time their Mac’s camera and microphone are switched on – either by a legitimate process or, more importantly, by malware – …

sign
Security fatigue is real – we need usable security

A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security …

mask
DefecTor: DNS-enhanced correlation attacks against Tor users

A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …

Yahoo
Yahoo breach was not state-sponsored, researchers claim

The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat …

satellite
We have to start thinking about cybersecurity in space

With all the difficulties we’ve been having with securing computer systems on Earth, the cybersecurity of space-related technology is surely the last thing on security …

Tesla interior
Chinese researchers hijack Tesla cars from afar

Tesla car owners are urged to update their car’s firmware to the latest version available, as it fixes security vulnerabilities that can be exploited remotely to take …

Don't miss

Cybersecurity news