Hacking News
May 6, 2015

Latest Headlines
updated 6:02am EDT

More Hacking News
May 6, 2015

New Technology to Help Users Combat Mobile Malware Attacks

Mar. 26, 2015 — Researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking ... read more

Mar. 26, 2015 — Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an ... read more

Mar. 23, 2015 — Integer overflows are one of the most common bugs in computer programs -- not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. Computer ... read more

Simple Tasks Help Protect Your Credit

Mar. 23, 2015 — With mega data breaches coming from entities such as retail stores, insurance providers and restaurant chains, someone could more easily gain access to personal financial information that consumers ... read more

New Approach Uses 'Twisted Light' to Increase Efficiency of Quantum Cryptography Systems

Mar. 20, 2015 — Researchers have developed a way to transfer 2.05 bits per photon by using 'twisted light.' This remarkable achievement is possible because the researchers used the orbital angular momentum ... read more

Mobile Quarantine Station for Malicious Android Apps

Mar. 13, 2015 — The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store -- ones ... read more

Developers Neglect Privacy, Security in Health Apps

Mar. 12, 2015 — Telemedicine researchers have proposed a series of recommendations to programmers to improve the security of health applications on mobile devices. According to these specialists, it is a rapidly ... read more

Computer Scientists Simplify Parallel Programming

Mar. 12, 2015 — Modern software takes computational speed for granted. But modern microprocessors can only speed up by increasing the number of cores. To take full advantage of multiple cores, software developers ... read more

Guarantees for Online Anonymity?

Mar. 11, 2015 — Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up ... read more

Find out What Your Apps Are Really Doing

Mar. 10, 2015 — Apps, these tiny programs on Internet-connected mobile phones are increasingly becoming entryways for surveillance and fraud. Computer scientists have now developed a program that can show users ... read more

Security in a Smart World

Mar. 5, 2015 — More stable power grids and quicker accident care: When used properly, digital data may be of high benefit. However, electronic processing also facilitates data abuse. For this reason, scientists ... read more

Feb. 27, 2015 — Engineers have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can protect the integrity of computer chips using advanced optical imaging and photon-based ... read more

Feb. 27, 2015 — Company networks are inflexible – they are made up of many components that require a good deal of effort to be connected together. That’s why networks of the future will be controlled by a ... read more

Feb. 24, 2015 — Smartphones have replaced nearly every conceivable gadget, but computer scientists are teaching them some new tricks. The researchers are adapting accelerometers, GPS chips, gyroscopes and other ... read more

Criminologist 'Hacks' the Hacker

Feb. 16, 2015 — We often view hackers as evil geniuses, but perhaps a more accurate depiction would be a talented -- though sometimes mischievous -- craft worker, according to a researcher. The way society views ... read more

Social Network Analysis Privacy Tackled

Feb. 14, 2015 — Protecting people's privacy in an age of online big data is difficult, but doing so when using visual representations of such things as social network data may present unique challenges, ... read more

Feb. 13, 2015 — Communication security and metrology could be enhanced through a study of the role of quantum correlations in the distinguishability of physical processes, scientists ... read more

Feb. 10, 2015 — Anyone could call up or modify several million pieces of customer data online including names, addresses and e-mails. Three students were able to show this for 40,000 online databases in both Germany ... read more

Security: Protecting Customers Charging Electric Vehicles on Smart Electricity Grids

Feb. 4, 2015 — As electricity grids become more sophisticated, grid administrators can collect instantaneous data on consumer and supplier behavior. The 'smart grid' then learns to improve the ... read more

Feb. 2, 2015 — Production facilities and components of Industry 4.0 are linked to the Internet, networked with each other, and thus open to attack. Using an IT security laboratory, researchers offer a test ... read more

Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Wednesday, March 11, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Monday, February 16, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Tuesday, February 10, 2015
Wednesday, February 4, 2015
Monday, February 2, 2015
Thursday, January 8, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Tuesday, December 16, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Tuesday, November 25, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Thursday, November 13, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014
Tuesday, October 21, 2014
Thursday, October 16, 2014
Wednesday, October 15, 2014
Tuesday, October 14, 2014
Tuesday, October 7, 2014
Monday, October 6, 2014
Monday, September 29, 2014
Thursday, September 25, 2014
Monday, September 22, 2014
Monday, September 15, 2014
Tuesday, September 9, 2014
Wednesday, September 3, 2014
Friday, August 29, 2014
Monday, August 25, 2014
Thursday, August 21, 2014
Wednesday, August 20, 2014
Thursday, August 7, 2014
Thursday, July 24, 2014
Wednesday, July 23, 2014
Thursday, July 10, 2014
Wednesday, July 9, 2014
Tuesday, June 24, 2014
Thursday, June 19, 2014
Wednesday, June 18, 2014
Friday, June 13, 2014
Wednesday, June 4, 2014
Monday, June 2, 2014
Friday, May 30, 2014
Wednesday, May 21, 2014
Thursday, May 15, 2014
Monday, May 12, 2014
Thursday, May 8, 2014
Tuesday, April 29, 2014
Friday, April 25, 2014
Thursday, April 24, 2014
Tuesday, April 15, 2014
Monday, April 14, 2014
Thursday, April 3, 2014
Thursday, March 27, 2014
Wednesday, March 26, 2014
Tuesday, March 25, 2014
Thursday, March 20, 2014
Wednesday, March 19, 2014
Thursday, March 13, 2014
Wednesday, March 12, 2014
Tuesday, March 11, 2014
Friday, March 7, 2014
Thursday, March 6, 2014
Wednesday, March 5, 2014