Mobile banking apps in developing nations have weak security
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
The developing world is increasingly using mobile banking apps to move money, but new research shows those apps are often poorly coded and pose security risks.
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
Knocking a drone out of the sky is sometimes possible using an invisible weapon -- sound.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.
Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect.
The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the "Internet of Things."
Cheating gamers pay as little as $10 per month to launch denial of service attacks against their opponents as a tactical advantage using commercial providers that walk the line between being legitimate businesses that stress-test their customers' networks and purveyors of DDoS as a service, researchers at USENIX Security 2013 say.
Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with security software that detects the presence of attack code even if it has morphed and tracks down domains that infected client machines report to.
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
Researchers at the PlanetLab global research network have developed a potential replacement for the widely used Unix sudo tool, called Vsys, that will offer administrators far greater control over what end users can and can't access.
Purveyors of cloud storage services may be doing their customers, or themselves, a disservice by relying on imprecise metrics for billing, argued a researcher at a Usenix conference.
The history of technological media is littered with platforms we no longer use. Often called "dead media," many of them actually live on in technologies that are widely used today, and can teach us much about how to design platforms for the future, according to New York University postdoctoral researcher Finn Brunton.
In the future, when an administrator does a server build, he or she may be adding a MapReduce library to the usual stack of server, database and middleware software.
Five dollars for control over 1,000 compromised email accounts. Eight dollars for a distributed denial-of-service attack that takes down a website for an hour. And just a buck to solve 1,000 captchas.