Consumer & Gadgets

Numerous manufacturers use insecure Android kernels, analysis shows

In an analysis of smartphones from 10 manufacturers, researchers at TU Graz have found that the Android kernels used are vulnerable to known attacks—so-called one-day exploits—despite existing protection mechanisms.

Internet

Safer web surfing with a new method for detecting malicious modes

With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim's PC with a malicious ...

Hi Tech & Innovation

Sniffing out your identity with breath biometrics

Biometric authentication like fingerprint and iris scans are a staple of any spy movie, and trying to circumvent those security measures is often a core plot point. But these days the technology is not limited to spies, as ...

Security

Detecting distributed denial of service attacks

The distributed denial-of-service (DDOS) attack may well be familiar to anyone who has spent time running online services, such as websites. It is a malicious attack on the servers running the system that simply bombards ...

page 3 from 6