Claim: Personal touch signature makes mobile devices more secure

Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.

Quantum cryptography for mobile phones

Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.

Black markets for hackers are increasingly sophisticated, specialized and maturing

Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study.

New technique targets C code to spot, contain malware attacks

Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language – which is often used to create root exploit malware, whereas the bulk of Android applications are written in Java.

Using stolen computer processing cycles to mine Bitcoin

A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile.  

How to identify malicious Android apps on Google Play

"How do I know that the new installed app behaves as described?" asks Andreas Zeller, professor of software engineering at Saarland University. So far experts have identified so-called malicious apps by checking their behavior against patterns of known attacks. "But what if the attack is brand-new?" asks Zeller.

Finding the hidden zombie in your network

How do you detect a "botnet", a network of computers infected with malware -so-called zombies - that allow a third party to take control of those machines? The answer may lie in a statistical tool first published in 1966 and brought into the digital age researchers writing this month in the International Journal of Electronic Security and Digital Forensics.

Can this Blackphone stop the NSA?



PGP creator Phil Zimmermann is back with the uber-secure Blackphone.

Will Target ever recover losing 110 million customers' credit card data?

Let's be fair, Target has tried and tried to show full transparency in view of the massive credit card hack that it, and its customers, have suffered. The company is being apologetic. But, can it ever recover from something this huge, and it may not be over, yet.

Snapchat drops collective jaws of world by offering an apology

We asked the question, Is Snapchat run by arrogant jerks? The answer was, yes. But, now, the sweet little douches are making amends by publicly - drumroll, hold breath - apologizing. We'd like to think it was because of our tirade. But, it probably has to do with trying to be good to your millions of users. 

Firm Sues Bank Over Cyberheist

The receiver for the now-defunct California-based Efficient Services Escrow Group is suing its former bank over a $1.5 million account takeover fraud incident that between December 2012 and January 2013 drained the escrow company's account.Peter Davidson of the California law firm Ervin, Cohen & Jessup LLP, the appointed receiver for Efficient Services Escrow, alleges First Foundation Bank of California had insufficient security procedures in place when cybercriminals hacked Efficient Services Escrow Group's bank account.

Is Snapchat run by arrogant jerks?

If you lost 4.6 million user names to hackers, didn't really have an answer for why or how you prevent the same thing happening again, and have absolutely no path to revenues, profitability, or whatever constitutes a real business, would you be kind of a dick about your business lacking some basic security?

Windows crashes helping hackers identify vulnerabilities

Websense has found that Windows standard error reports are leaking information which could be used by a hacker to craft specific attacks and compromise networks. 

Syrian Electronic Army hacks Skype

How is it that the SEA is soooo good at this hacking thing? And why are they trying to help Steve Ballmer find a new job?

BBC gets hacked over Christmas

  Red-faced security experts at the BBC are having to explain how a hacker broke into their systems over the Christmas break.

A Royal Pardon for Castrated Homosexual Code Breaker

Alan Turing, the man who helped save the world from the Nazis, and the creator of the computer, has finally been pardoned for the crime of fancying blokes.

RSA didn't let the NSA in through the backdoor

The RSA has angrily denied a claim that it secretly took $10 million from the NSA to use the buggered up Dual Elliptic Curve Deterministic Random Bit Generator in its encryption products.

British government porn filters block tech sites

It is just as we predicted, British Prime Minister, David Cameron's wonderful "save the children" porn filter is just another attempt by the Tories to prevent people finding out information.

Target credit card data theft gets worse

  Any way you cut it, this is a bad situation for Target's shoppers and the company itself, and I don't see how it gets any better right now. The latest from Krebs, who broke the story in the first place, will blow your mind.

Does the IRS know how to tax Bitcoins?

It's someone's money and the IRS wants its cut. However, it doesn't seem like anyone knows how virtual currencies are going to be handled by the tax authorities.