Hacking News
July 1, 2015

Latest Headlines
updated 11:41pm EDT

More Hacking News
July 1, 2015

Time to Move Beyond 'Medieval' Cyber Security Approach, Expert Says

May 21, 2015 — The nation's approach to cyber security has much in common with medieval defense tactics, and that needs to change, says a cyber security ... read more

Online Safety: If You Want Something Done Right, Do It Yourself

May 20, 2015 — The end-user is often the 'weakest link' in the Internet safety chain according to experts. The team's conclusion: Internet users have to take personal responsibility for their safety ... read more

Electronic Security Tag for Protecting Valuable Shipments

May 11, 2015 — An electronic security tag has been developed that can used to protect valuable shipments and enhance product safety in the future. By using a security tag equipped with sensors, the sender and the ... read more

Apr. 22, 2015 — In a first-of-its-kind study, researchers tested brain activity to better understand employees who pose a risk to ... read more

Invisible Inks Could Help Foil Counterfeiters of All Kinds

Apr. 22, 2015 — Scientists have invented sophisticated fluorescent inks that one day could be used as multicolored barcodes for consumers to authenticate products often counterfeited. Snap a photo with your ... read more

Apr. 16, 2015 — Computer scientists are developing software to detect so-called algorithmic attacks, an emerging hacking threat that is nearly impossible to find with existing security ... read more

Quantum Cryptography at the Speed of Light: Researchers Design First All-Photonic Repeaters

Apr. 15, 2015 — Engineers bring perfectly secure information exchanges one step to reality. They have now designed the first all-photonic quantum repeaters -- protocols that ensure data can be carried reliably and ... read more

Increase Seen in Data Breaches of Health Information

Apr. 14, 2015 — Between 2010 and 2013, data breaches of protected health information reported by HIPAA-covered entities increased and involved approximately 29 million records, with most data breaches resulting from ... read more

Apr. 8, 2015 — In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that ... read more

HIV Spreads Like Internet Malware and Should Be Treated Earlier

Apr. 2, 2015 — A new model for HIV progression finds that it spreads in a similar way to some computer worms and predicts that early treatment is key to staving off AIDS. HIV specialists and network security ... read more

New Technology to Help Users Combat Mobile Malware Attacks

Mar. 26, 2015 — Researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking ... read more

Mar. 26, 2015 — Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an ... read more

Mar. 23, 2015 — Integer overflows are one of the most common bugs in computer programs -- not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. Computer ... read more

Simple Tasks Help Protect Your Credit

Mar. 23, 2015 — With mega data breaches coming from entities such as retail stores, insurance providers and restaurant chains, someone could more easily gain access to personal financial information that consumers ... read more

New Approach Uses 'Twisted Light' to Increase Efficiency of Quantum Cryptography Systems

Mar. 20, 2015 — Researchers have developed a way to transfer 2.05 bits per photon by using 'twisted light.' This remarkable achievement is possible because the researchers used the orbital angular momentum ... read more

Mobile Quarantine Station for Malicious Android Apps

Mar. 13, 2015 — The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store -- ones ... read more

Developers Neglect Privacy, Security in Health Apps

Mar. 12, 2015 — Telemedicine researchers have proposed a series of recommendations to programmers to improve the security of health applications on mobile devices. According to these specialists, it is a rapidly ... read more

Computer Scientists Simplify Parallel Programming

Mar. 12, 2015 — Modern software takes computational speed for granted. But modern microprocessors can only speed up by increasing the number of cores. To take full advantage of multiple cores, software developers ... read more

Guarantees for Online Anonymity?

Mar. 11, 2015 — Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up ... read more

Find out What Your Apps Are Really Doing

Mar. 10, 2015 — Apps, these tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists have now developed a program that can show users ... read more

Thursday, May 21, 2015
Wednesday, May 20, 2015
Monday, May 11, 2015
Wednesday, April 22, 2015
Thursday, April 16, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, April 2, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Wednesday, March 11, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Monday, February 16, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Tuesday, February 10, 2015
Wednesday, February 4, 2015
Monday, February 2, 2015
Thursday, January 8, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Tuesday, December 16, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Tuesday, November 25, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Thursday, November 13, 2014
Tuesday, November 11, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 21, 2014
Thursday, October 16, 2014
Wednesday, October 15, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Monday, September 29, 2014
Thursday, September 25, 2014
Monday, September 22, 2014
Monday, September 15, 2014
Tuesday, September 9, 2014
Wednesday, September 3, 2014
Friday, August 29, 2014
Monday, August 25, 2014
Thursday, August 21, 2014
Wednesday, August 20, 2014
Thursday, August 7, 2014
Thursday, July 24, 2014
Wednesday, July 23, 2014
Thursday, July 10, 2014
Wednesday, July 9, 2014
Tuesday, June 24, 2014
Thursday, June 19, 2014
Wednesday, June 18, 2014
Friday, June 13, 2014
Wednesday, June 4, 2014
Monday, June 2, 2014
Friday, May 30, 2014
Wednesday, May 21, 2014
Thursday, May 15, 2014
Monday, May 12, 2014
Thursday, May 8, 2014
Tuesday, April 29, 2014
Friday, April 25, 2014
Thursday, April 24, 2014
Tuesday, April 15, 2014
Monday, April 14, 2014
Thursday, April 3, 2014
Thursday, March 27, 2014
Wednesday, March 26, 2014