Security

How it takes just six seconds to hack a credit card

Working out the card number, expiry date and security code of any Visa credit or debit card can take as little as six seconds and uses nothing more than guesswork, new research has shown.

Security

Princeton researchers spot website visits being watched

(Tech Xplore)—File under Uncomfortable. A study by a Princeton team finds you may be watched (and watched and watched) as you go on about your business of using the Internet and visiting sites.

Security

These new techniques expose your browsing history to attackers

Security researchers at UC San Diego and Stanford have discovered four new ways to expose Internet users' browsing histories. These techniques could be used by hackers to learn which websites users have visited as they surf ...

Security

Google eyes shift from passwords sooner than you may think

Is this a dream or an answer to yours? Is Google really set to kill the password on Android—in 2016? Wait, that is this year. The headlines are not a dream. Google is to ditch passwords in favor of a biometrics means for ...

Security

USB malware goes after air-gapped computers

Uh-oh. USB malware trouble again. Earlier this week, iTWire and other sites reported on USB-based malware that steals data. "USB Thief" is also described as Win32/PSW.Stealer.NAI affecting computers.

Security

Microsoft issues advisory on Internet Explorer vulnerability

(Phys.org) —Microsoft issued a security advisory on Saturday regarding an issue that impacts the Internet Explorer Web browser. Microsoft said it was aware of limited, targeted attacks seeking to exploit the vulnerability ...

Security

30C3: SD card tricks can deliver MITM attacks

(Phys.org) —This year's 30th Chaos Communication Congress (30C3) in Hamburg from December 27 to December 30 carried numerous informative presentations, including a reverse-engineering story about SD cards, which two investigators ...

Security

Using machine learning to detect software vulnerabilities

A team of researchers from R&D company Draper and Boston University developed a new large-scale vulnerability detection system using machine learning algorithms, which could help to discover software vulnerabilities faster ...

Security

Study finds 'lurking malice' in cloud hosting services

A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised - with several hundred of the "buckets" actively providing malware. Such bad content ...

page 1 from 26