Security

Combination of features produces new Android vulnerability

A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly-used features in popular apps. The ...

Security

Weaponizing the internet for terrorism

Terrorism is a fact of life as are the collectives and networks to which counter-terrorism organizations and the media have given various labels and names. These networks are well versed in exploiting modern information technology ...

Security

The next cyberattack could come from sound waves

You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from "side-channel" attacks, where an intruder can bypass ...

Security

New vulnerability discovered in common online security

One of the world's most common security software packages – used as the basis of protection for many web browsers – has been found to be vulnerable to a specific form of attack, according to research led by the University ...

page 10 from 40