Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.
Secure mobile communications underpin our society and through mobile phones, tablets and laptops we have become online consumers. The security of mobile transactions is obscure to most people but is absolutely essential if we are to stay protected from malicious online attacks, fraud and theft.
Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments and individuals, according to a new RAND Corporation study.
Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language – which is often used to create root exploit malware, whereas the bulk of Android applications are written in Java.
A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile.
"How do I know that the new installed app behaves as described?" asks Andreas Zeller, professor of software engineering at Saarland University. So far experts have identified so-called malicious apps by checking their behavior against patterns of known attacks. "But what if the attack is brand-new?" asks Zeller.
How do you detect a "botnet", a network of computers infected with malware -so-called zombies - that allow a third party to take control of those machines? The answer may lie in a statistical tool first published in 1966 and brought into the digital age researchers writing this month in the International Journal of Electronic Security and Digital Forensics.
PGP creator Phil Zimmermann is back with the uber-secure Blackphone.
Let's be fair, Target has tried and tried to show full transparency in view of the massive credit card hack that it, and its customers, have suffered. The company is being apologetic. But, can it ever recover from something this huge, and it may not be over, yet.
We asked the question, Is Snapchat run by arrogant jerks? The answer was, yes. But, now, the sweet little douches are making amends by publicly - drumroll, hold breath - apologizing. We'd like to think it was because of our tirade. But, it probably has to do with trying to be good to your millions of users.
The receiver for the now-defunct California-based Efficient Services Escrow Group is suing its former bank over a $1.5 million account takeover fraud incident that between December 2012 and January 2013 drained the escrow company's account.Peter Davidson of the California law firm Ervin, Cohen & Jessup LLP, the appointed receiver for Efficient Services Escrow, alleges First Foundation Bank of California had insufficient security procedures in place when cybercriminals hacked Efficient Services Escrow Group's bank account.
If you lost 4.6 million user names to hackers, didn't really have an answer for why or how you prevent the same thing happening again, and have absolutely no path to revenues, profitability, or whatever constitutes a real business, would you be kind of a dick about your business lacking some basic security?
Websense has found that Windows standard error reports are leaking information which could be used by a hacker to craft specific attacks and compromise networks.
How is it that the SEA is soooo good at this hacking thing? And why are they trying to help Steve Ballmer find a new job?
Red-faced security experts at the BBC are having to explain how a hacker broke into their systems over the Christmas break.
Alan Turing, the man who helped save the world from the Nazis, and the creator of the computer, has finally been pardoned for the crime of fancying blokes.
The RSA has angrily denied a claim that it secretly took $10 million from the NSA to use the buggered up Dual Elliptic Curve Deterministic Random Bit Generator in its encryption products.
It is just as we predicted, British Prime Minister, David Cameron's wonderful "save the children" porn filter is just another attempt by the Tories to prevent people finding out information.
Any way you cut it, this is a bad situation for Target's shoppers and the company itself, and I don't see how it gets any better right now. The latest from Krebs, who broke the story in the first place, will blow your mind.
It's someone's money and the IRS wants its cut. However, it doesn't seem like anyone knows how virtual currencies are going to be handled by the tax authorities.