researchers

Wed
02
Oct
John Lister's picture

Major VOIP Security Flaws Discovered in Android

Researchers say they discovered eight security flaws in the way Android handles voice calls through the Internet. Unlike most such bugs which involve specific apps, these problems were with Android itself. The good news is that the researchers ... reported all of the bugs to Google while carrying out the project and most have now been fixed. However, it does raise concerns about the development and design of the system itself. (Source: github.io ) The researchers looked at the three latest Android versions (7, 8 and 9), specifically addressing the components that allow Voice Over Internet ... (view more)

Thu
19
Sep
John Lister's picture

Study Reveals Smart Gadgets Share Data Unexpectedly

Researchers have discovered that many smart gadgets (such as smart TVs and streaming sticks) send data to tech companies, even when idle. The purpose of the experiment was to determine if devices were being used to monitor users, or could ... potentially leak data about the user to a third party. The research was a joint project between Northeastern University and the UK's Imperial College London. They examined 81 devices under the broad category of the Internet of Things (IoT). The study included security cameras, home automation devices such as WiFi plugs, Smart TV sets, smart speakers and home ... (view more)

Thu
15
Aug
John Lister's picture

Over 1 Million Fingerprints Exposed Online

More than one million fingerprints were exposed online for at least a week, according to security researchers. The company responsible for the data says it will take immediate action if there's a security threat. The data is held by Suprema, which ... operates a biometric lock system called Biostar 2. It lets building owners restrict access by fingerprint or facial recognition, rather than relying on measures such as physical keys or pass codes. The Guardian newspaper reports that Biostar 2 is used in a wider system that has 5,700 customers accessing 1.5 million locations across 83 countries. ... (view more)

Mon
10
Jun
John Lister's picture

Scientists: Internet Usage Affects Brain Waves, Memory

Psychiatry experts say using the Internet could "affect our brain's structure, function and cognitive development." An international group of researchers say that as a result of Internet use, we may be losing our abilities to concentrate on a single ... task. The theory has to do with the way many people access the Internet - particularly with email and social media, which often means getting a string of notifications that oftentimes demand immediate attention. This means people spend less time consistently working on one task uninterrupted, which then creates a "use it or lose it" effect on ... (view more)

Wed
08
May
John Lister's picture

Scientists: Social Media Effects on Kids 'Trivial'

A University of Oxford study claims any negative effects of social media on teens are likely trivial. It said other life events had a far greater effect. The study used data from extensive household surveys that ran between 2009 and 2016 which ... covered a wide range of issues. The researchers mined the survey results for responses from children who were aged 10 to 15 at the time of questioning, with more than 12,000 children covered. (Source: pnas.org ) The researchers looked at questions about how many hours the children spent communicating on social networks on school days. They compared this ... (view more)

Thu
19
Jul
John Lister's picture

Scientists: Internet 'At Risk' of Climate Change

Researchers say key physical infrastructure that keeps the Internet working could be underwater within 15 years. They say the effects of climate change over the next century will have an impact on the equipment sooner than later. The researchers, ... from the Universities of Oregon and Wisconsin, explored the risks to US-based infrastructure including both the cables that carry Internet data and the key 'nodes' in the network such as colocation centers. These facilities not only route Internet data, but also house the computers where many websites are physically stored. Major website often rent ... (view more)

Thu
10
Aug
John Lister's picture

Facebook Exec: Security Researchers Not Doing Enough

According to Facebook's head of security Alex Stamos, the security industry needs to do more to solve problems that affect ordinary people in their everyday lives. He says researchers are often too obsessed with technical detail because they lack ... empathy. Stamos spoke at Black Hat, a conference that brings together security professionals, researchers, self-described hackers and those with an interest in the topic. (Source: bbc.co.uk ) He said the security community had proven justified in many of its warnings about flaws in systems and networks, but that it hadn't done enough to find ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Wed
12
Apr
John Lister's picture

Researchers: Phone Tilt Could Reveal PIN

Motion sensors in smartphones could give away your lock code to hackers according to new research. But practical limitations mean related attacks might have to be specifically targeted. Researchers at Newcastle University explored the idea that ... tools such as accelerometers, gyroscopes, compasses and GPS chips in phones could reveal more detail than users realize. The tools are used for a variety of functions such as location tracking, fitness tracking and gesture control such as a user turning a phone face down to instantly switch it to "do not disturb" mode. Their theory was that ... (view more)

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Pages

Subscribe to RSS - researchers