Internet

Credit card skimmers hide in web page image files

A particularly nasty form of consumer credit card theft centers on the use of skimming devices embedded in credit card machines at locations such as gas stations and convenience stores. As a customer swipes a card, the hidden ...

Hardware

Serious security vulnerabilities in DRAM memory devices

Researchers at ETH Zurich have discovered major vulnerabilities in DRAM memory devices, which are widely used in computers, tablets and smartphones. The vulnerabilities have now been published together with the National Cyber ...

Electronics & Semiconductors

Vulnerability found in Kindle e-reader

A team of researchers at security firm Check Point Research has discovered a vulnerability in Kindle e-readers—one that could allow hackers to take over the device, delete data and potentially gain access to Amazon account ...

Software

Microsoft says hackers viewed source code, didn't change it

Microsoft hackers tied to a massive intrusion of dozens of U.S. government agencies and private companies sneaked further into its systems than previously thought, although the intrusion doesn't appear to have caused any ...

Security

Shadow Figment technology foils cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success.

page 1 from 15