Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language – which is often used to create root exploit malware, whereas the bulk of Android applications are written in Java.
A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile.
"How do I know that the new installed app behaves as described?" asks Andreas Zeller, professor of software engineering at Saarland University. So far experts have identified so-called malicious apps by checking their behavior against patterns of known attacks. "But what if the attack is brand-new?" asks Zeller.
How do you detect a "botnet", a network of computers infected with malware -so-called zombies - that allow a third party to take control of those machines? The answer may lie in a statistical tool first published in 1966 and brought into the digital age researchers writing this month in the International Journal of Electronic Security and Digital Forensics.
PGP creator Phil Zimmermann is back with the uber-secure Blackphone.
The RSA has angrily denied a claim that it secretly took $10 million from the NSA to use the buggered up Dual Elliptic Curve Deterministic Random Bit Generator in its encryption products.
AVG, best known for its security software applications, has added WiFi Do Not Track (DNT) to is Android PirvacyFix app. This will kill all those comments about "Minority Report" and we are happy about anything that will stop people trying to sell us crap we don't want based on erroneous information that they've gotten through nefarious means. Suck it, retailers!
A hacker group based in Germany says it has managed to crack Apple's new Touch ID biometric security system with a modified fingerprint lifting method and a "fake finger" creation technique.
The digital rights management (DRM) market will grow at a rate of 12% annually to become a $1.2 billion market by 2018, while the related conditional access (CAS) market will decline slightly to dip below $1.5 billion annually.
#doyouknowwhoswatchingyou? A new study from USC researchers sampled more than 15 million tweets, showing that some Twitter users may be inadvertently revealing their location through updates on the social media channel.
Syrian Electronic Army (SEA) hackers "broke into" Melbourne IT, an Australian Internet services company that claims Twitter and the New York Times as its customers.
Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, uncovering significant security threats to the iOS platform.
Scientists recently launched unmanned aerial vehicles (UAVs) from a research vessel in a significant experiment that could help boost the Navy’s radar and communications performance at sea.
UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as "software obfuscation," and it is reportedly the first time it has been accomplished.
It’s a wonder we still put up with passwords. We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.
Cloud computing - outsourcing computational tasks over the Internet - could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.
Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.
Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.
The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.