Hacking News
February 7, 2016

Latest Headlines
updated 5:17am EST

More Hacking News
February 7, 2016

Comfort Is Important in Identification: Bank Identification Is the Most Trusted Method, Passwords Come Second

Dec. 10, 2015 — A study about user attitudes to different personal identification methods has been conducted. It concludes that the most popular identification methods were internet banking access codes and ... read more

Closing a Malware Security Loophole

Dec. 7, 2015 — An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. The research raises the ... read more

Email Security Improving, but Far from Perfect

Nov. 19, 2015 — Email security helps protect some of our most sensitive data: password recovery confirmations, financial data, confidential correspondences, and more. According to a new report, email security is ... read more

Focusing on User Habits Key to Preventing Email Phishing, According to Research

Nov. 11, 2015 — The cumulative number of successful phishing cyberattacks has risen sharply over the last decade, and in 2014 that figure surged past the total US population. To date, about 400 million breaches have ... read more

Nov. 10, 2015 — Think your web browsing is private? A new study of one million top websites finds that 88 percent reveal user data to third parties, often without the user's ... read more

Shields Up: Researchers Are Making the Internet More Secure

Nov. 5, 2015 — Scientists are developing a service that can sniff out, ward off and protect against large-scale online attacks known as Distributed Denial of Service, or DDoS, ... read more

Potential Security Hole in Genomic Data Sharing Network Identified

Oct. 29, 2015 — Sharing genomic information among researchers is critical to the advance of biomedical research. Yet genomic data contains identifiable information and, in the wrong hands, poses a risk to individual ... read more

Researchers Find Vulnerabilities in Use of Certificates for Web Security

Oct. 28, 2015 — A new study offers the first end-to-end evaluation of the Web's certificate revocation ecosystem, which includes website administrators that obtain and revoke certificates, certificate ... read more

Oct. 23, 2015 — Researchers tested users’ abilities to detect malware and phishing attacks while measuring the neurophysiological behavior underlying these ... read more

Smart Car Cyberattack Warning: Flaws Found in Security Systems

Oct. 20, 2015 — How Australia acts today will determine the security and safety of driverless cars, autonomous vehicles and intelligent transport systems in the future, with academics warning there is a risk of ... read more

Think Again Before Tapping the Install Button for That App

Oct. 17, 2015 — Multitasking when using mobile devices creates stress and increases the potential for choosing unsafe apps, new research shows. A new study examined the conditions under which mobile device users are ... read more

Oct. 13, 2015 — In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or hardware manufacturers, has ... read more

Is Your Digital Information More at Risk Today Than It Was Ten Years Ago?

Oct. 13, 2015 — Researchers say that cybersecurity breeches are not happening more frequently than they did a decade ago. And these data breaches in general are not growing in ... read more

New Research Method Identifies Stealth Attacks on Complicated Computer Systems

Oct. 13, 2015 — Computer scientists are unveiling a novel approach to discovering stealth attacks on computers. The scientists' secret formula in finding a stealth attack is in their algorithms. With specific ... read more

New Tool Expands Tracking of Personal Data on the Web

Oct. 9, 2015 — Researchers have developed a second-generation tool called 'Sunlight' that matches user-tailored ads and recommendations to tidbits of information supplied by users at a greater scale and ... read more

Theoretical Computer Science Provides Answers to Data Privacy Problem

Oct. 7, 2015 — The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be ... read more

Identifying Problems With National Identifiers

Sep. 29, 2015 — A team of researchers in two experiments was able to decrypt more than 23,000 RRNs using both computation and logical reasoning. The findings suggest that, while such identifiers are encrypted to ... read more

Scientists Stop and Search Malware Hidden in Shortened Urls on Twitter

Sep. 25, 2015 — Cyber-criminals are taking advantage of real-world events with high volumes of traffic on Twitter in order to post links to websites which contain ... read more

Information Handling by Some Health Apps Not as Secure as It Should Be

Sep. 24, 2015 — Some health apps that have been clinically accredited may not have been complying with principles of data protection, according to research. In some instances health apps were found to be sending ... read more

Protecting Identities in a Sea of Big Data

Sep. 23, 2015 — A computer scientist will use three grants to develop approaches to safeguarding sensitive genetic information. Along with co-researchers, he will systematically evaluate potential privacy breaches ... read more

Thursday, December 10, 2015
Monday, December 7, 2015
Thursday, November 19, 2015
Wednesday, November 11, 2015
Tuesday, November 10, 2015
Thursday, November 5, 2015
Thursday, October 29, 2015
Wednesday, October 28, 2015
Friday, October 23, 2015
Tuesday, October 20, 2015
Saturday, October 17, 2015
Tuesday, October 13, 2015
Friday, October 9, 2015
Wednesday, October 7, 2015
Tuesday, September 29, 2015
Friday, September 25, 2015
Thursday, September 24, 2015
Wednesday, September 23, 2015
Tuesday, September 22, 2015
Monday, September 21, 2015
Thursday, September 10, 2015
Monday, August 24, 2015
Thursday, August 20, 2015
Tuesday, August 18, 2015
Thursday, August 13, 2015
Wednesday, August 12, 2015
Tuesday, August 11, 2015
Tuesday, August 4, 2015
Monday, August 3, 2015
Thursday, July 30, 2015
Wednesday, July 29, 2015
Tuesday, July 28, 2015
Wednesday, July 22, 2015
Thursday, July 9, 2015
Thursday, July 2, 2015
Monday, June 29, 2015
Wednesday, June 24, 2015
Tuesday, June 2, 2015
Tuesday, May 26, 2015
Thursday, May 21, 2015
Wednesday, May 20, 2015
Monday, May 11, 2015
Thursday, May 7, 2015
Thursday, April 30, 2015
Tuesday, April 28, 2015
Wednesday, April 22, 2015
Thursday, April 16, 2015
Wednesday, April 15, 2015
Tuesday, April 14, 2015
Wednesday, April 8, 2015
Thursday, April 2, 2015
Wednesday, April 1, 2015
Thursday, March 26, 2015
Monday, March 23, 2015
Friday, March 20, 2015
Friday, March 13, 2015
Thursday, March 12, 2015
Wednesday, March 11, 2015
Tuesday, March 10, 2015
Thursday, March 5, 2015
Wednesday, March 4, 2015
Friday, February 27, 2015
Tuesday, February 24, 2015
Monday, February 16, 2015
Saturday, February 14, 2015
Friday, February 13, 2015
Tuesday, February 10, 2015
Wednesday, February 4, 2015
Monday, February 2, 2015
Thursday, January 8, 2015
Wednesday, January 7, 2015
Monday, December 22, 2014
Wednesday, December 17, 2014
Tuesday, December 16, 2014
Monday, December 15, 2014
Wednesday, November 26, 2014
Tuesday, November 25, 2014
Thursday, November 20, 2014
Friday, November 14, 2014
Thursday, November 13, 2014
Tuesday, November 11, 2014
Friday, November 7, 2014
Wednesday, November 5, 2014
Friday, October 31, 2014
Saturday, October 25, 2014