Target back on naughty list with another security vulnerability
Hackers can access your personal information from Target — again — thanks to a flaw in the retailer’s mobile app. In a blog post …
Newly found TrueCrypt flaw allows full system compromise
Windows users who rely on TrueCrypt to encrypt their hard drives have a security problem: a researcher has discovered two serious flaws in the …
New IP address blacklist based on Web chatter
Traditionally, blacklists of malicious IP addresses are assembled using honeypots and intrusion detection systems but a new approach, analyzing chatter on the dark and …
U.S. researchers show computers can be hijacked to send data as sound waves
A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to …
Researchers improve de-anonymization attacks for websites hiding on Tor
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing …
Elon Musk, Stephen Hawking, and thousands of artificial-intelligence researchers just issued a warning about killer robots ROB PRICE
More than a thousand artificial intelligence researchers have co-signed an open letter calling for a ban on autonomous weapons, or “killer robots.” As The …
United to award miles to security researchers who discover bugs
If you’re a security expert and fond of traveling, United Airlines’ new bug bounty program will likely be of interest. Companies such as Google, …
Security researcher’s hack caused airplane to climb, FBI asserts
The FBI contends a cybersecurity researcher said he caused an airplane’s engine to climb after hacking its software, according to a court document. The …
Hackers can hack Android smartphones using covert data channels using voice channel
Researchers demonstrate hack by creating a covert data channel using a smartphone’s voice channel to exfiltrate data albeit slowly From the time smartphones have …
Researchers hijack teleoperated surgical robot: Remote surgery hacking threats
When could a denial of service attack have lethal consequences? It could be fatal if it is launched at a “crucial point” during a …
Recent Comments