researchers

Wed
20
Nov
John Lister's picture

Android Malware Records Calls, Tracks Location

Google is fixing an Android bug that let hackers remotely capture videos and images without permission. The bug could also have revealed the user's precise location, making it particularly dangerous if exploited by stalkers. Security researchers at ... Checkmarx discovered the bug in several default camera apps on a variety of Android phones, including the Google and Samsung apps. (Source: arstechnica.com ) The bug could only be exploited once malware was on the phone, but even then it still shouldn't have allowed such an attack. That's because it involved using a rogue app on the phone to access ... (view more)

Wed
30
Oct
John Lister's picture

New Malware Hides Inside Audio Files

Most people know not to open an executable file or document attached to an email unless they were expecting it. But a new example of malware means even an audio file could trigger a payload. Researchers at Blackberry Cylance Threat recently ... uncovered malicious code hidden inside WAV files. That's a computer format for audio that was common for music on PCs before MP3 became established. The attackers are using a technique called steganography, which is a way to hide a file inside another file in a way that normally cannot be detected. Steganography has previously been used in image files, and ... (view more)

Wed
02
Oct
John Lister's picture

Major VOIP Security Flaws Discovered in Android

Researchers say they discovered eight security flaws in the way Android handles voice calls through the Internet. Unlike most such bugs which involve specific apps, these problems were with Android itself. The good news is that the researchers ... reported all of the bugs to Google while carrying out the project and most have now been fixed. However, it does raise concerns about the development and design of the system itself. (Source: github.io ) The researchers looked at the three latest Android versions (7, 8 and 9), specifically addressing the components that allow Voice Over Internet ... (view more)

Thu
19
Sep
John Lister's picture

Study Reveals Smart Gadgets Share Data Unexpectedly

Researchers have discovered that many smart gadgets (such as smart TVs and streaming sticks) send data to tech companies, even when idle. The purpose of the experiment was to determine if devices were being used to monitor users, or could ... potentially leak data about the user to a third party. The research was a joint project between Northeastern University and the UK's Imperial College London. They examined 81 devices under the broad category of the Internet of Things (IoT). The study included security cameras, home automation devices such as WiFi plugs, Smart TV sets, smart speakers and home ... (view more)

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Mon
10
Jun
John Lister's picture

Scientists: Internet Usage Affects Brain Waves, Memory

Psychiatry experts say using the Internet could "affect our brain's structure, function and cognitive development." An international group of researchers say that as a result of Internet use, we may be losing our abilities to concentrate on a single ... task. The theory has to do with the way many people access the Internet - particularly with email and social media, which often means getting a string of notifications that oftentimes demand immediate attention. This means people spend less time consistently working on one task uninterrupted, which then creates a "use it or lose it" effect on ... (view more)

Wed
08
May
John Lister's picture

Scientists: Social Media Effects on Kids 'Trivial'

A University of Oxford study claims any negative effects of social media on teens are likely trivial. It said other life events had a far greater effect. The study used data from extensive household surveys that ran between 2009 and 2016 which ... covered a wide range of issues. The researchers mined the survey results for responses from children who were aged 10 to 15 at the time of questioning, with more than 12,000 children covered. (Source: pnas.org ) The researchers looked at questions about how many hours the children spent communicating on social networks on school days. They compared this ... (view more)

Thu
19
Jul
John Lister's picture

Scientists: Internet 'At Risk' of Climate Change

Researchers say key physical infrastructure that keeps the Internet working could be underwater within 15 years. They say the effects of climate change over the next century will have an impact on the equipment sooner than later. The researchers, ... from the Universities of Oregon and Wisconsin, explored the risks to US-based infrastructure including both the cables that carry Internet data and the key 'nodes' in the network such as colocation centers. These facilities not only route Internet data, but also house the computers where many websites are physically stored. Major website often rent ... (view more)

Thu
10
Aug
John Lister's picture

Facebook Exec: Security Researchers Not Doing Enough

According to Facebook's head of security Alex Stamos, the security industry needs to do more to solve problems that affect ordinary people in their everyday lives. He says researchers are often too obsessed with technical detail because they lack ... empathy. Stamos spoke at Black Hat, a conference that brings together security professionals, researchers, self-described hackers and those with an interest in the topic. (Source: bbc.co.uk ) He said the security community had proven justified in many of its warnings about flaws in systems and networks, but that it hadn't done enough to find ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Pages

Subscribe to RSS - researchers