Security

Researchers invent low-cost alternative to Bitcoin

The cryptocurrency Bitcoin is limited by its astronomical electricity consumption and outsized carbon footprint. A nearly zero-energy alternative sounds too good to be true, but as School of Computer and Communication Sciences ...

Security

Two major security vulnerabilities found in PDF files

A combined team of researchers from Ruhr-University Bochum and Munster University has found two major security vulnerabilities in PDF files. They have documented their findings with a web-in-security blogspot posting.

Computer Sciences

A model to determine the impact of DDoS attacks using Twitter data

Distributed denial of service (DDoS) attacks, which are designed to prevent legitimate users from accessing specific network systems, have become increasingly common over the past decade or so. These attacks make services ...

Security

Spy chip planting said to be easy to do and tough to spot

Much too easy: Planting a two-dollar spy chip on hardware with a technique that can be pulled off on a less than $200 budget? Yet that was the work of a proof in concept investigation by a security researcher and tech-watching ...

Consumer & Gadgets

Checkm8 iPhone exploit becomes talk of jailbreak town

An unpatchable exploit in iOS devices could lead to a permanent jailbreak in generations of phones. Dan Goodin in Ars Technica put the number at 11 generations of iPhones, from the 4S to the X.

Security

Linksys announces motion detection with its mesh Wi-Fi routers

Linksys, a division within Belkin International and Foxconn Interconnect Technology, has announced that it is offering a new motion detection service with its mesh Wi-Fi routers. As part of its announcement, the company said ...

Security

Combination of techniques could improve security for IoT devices

A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices—such as smart TVs, home video cameras and baby monitors—against current risks and threats has created by a team ...

Security

Using machine learning to hunt down cybercriminals

Hijacking IP addresses is an increasingly popular form of cyber-attack. This is done for a range of reasons, from sending spam and malware to stealing Bitcoin. It's estimated that in 2017 alone, routing incidents such as ...

page 1 from 2