Wednesday, November 13th, 2013
At information security conference PacSec 2013 in Tokyo, two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP.
Japanese squad Team MBSD, of Mitsui Bussan Secure Directions, Inc., collected $40,000 for installing malware and collecting personal data on the Android-powered Samsung Galaxy S4. The group ...
Posted in Coding, Hardware, Internet, Mobile, Security | No Comments
Monday, October 14th, 2013
A security researcher this weekend discovered a backdoor vulnerability with certain D-Link routers that might allow cyber criminals to alter a router's setting without a username or password.
In a note on its website, D-Link said it is "proactively working with the sources of these reports as well as continuing to review ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, September 17th, 2013
A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level.
As proof of the effectiveness of the approach, ...
Posted in Hardware, Privacy, Security | No Comments
Saturday, August 17th, 2013
Apple’s App Store can seem like Fort Knox, with Apple reviewing each and every app before making it live. This fastidious approach works, for the most part, but it isn’t a perfect process. MIT Technology Review reports that researchers from Georgia Tech recently managed to get a malware-infected app approved by Apple ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Saturday, August 3rd, 2013
Do you carry your cell phone with you wherever you go? Of course you do. Indeed, a study even showed that 75% of people actually use their phone while in the bathroom! So is it any surprise that the best way to get information on suspected criminals would be to snoop ...
Posted in Hardware, Internet, Privacy, Security | No Comments