Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Security

Defending against cyberattacks by giving attackers 'false hope'

With almost every online purchase, a person's personal information—name, date of birth and credit card number—is stored electronically often in the "cloud," which is a network of internet servers. Now, as more people ...

Computer Sciences

A new method to detect false data injection (FDI) attacks

Researchers at Beijing Institute of Technology (BIT) have recently developed a new method to detect false data injection (FDI) attacks on critical infrastructure such as power grids. Their solution, outlined in a paper presented ...

Security

How a personality trait puts you at risk for cybercrime

Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research from Michigan State University examines the behaviors—both ...

Security

New attacks on graphics processors endanger user privacy

Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer's graphics processing unit, or GPU, to spy on web activity, steal passwords, and break ...

Security

These new techniques expose your browsing history to attackers

Security researchers at UC San Diego and Stanford have discovered four new ways to expose Internet users' browsing histories. These techniques could be used by hackers to learn which websites users have visited as they surf ...

page 36 from 40