Hacking News
May 27, 2017

Latest Headlines
updated 5:36am EDT

More Hacking News
May 27, 2017

New Password Meter That Will Change How Users Make Passwords

May 8, 2017 — Researchers have just unveiled a new, state-of-the-art password meter that offers real-time feedback and advice to help people create better ... read more

The Key to Private and Efficient Data Storage

Apr. 29, 2017 — Cloud storage services, like Dropbox and Gmail, may soon be able to better manage your content, giving you more storage capacity while still being unable to ‘read’ your ... read more

Recent Advances and New Insights Into Quantum Image Processing

Apr. 11, 2017 — Researchers who are active scientists in quantum information processing shared their comprehensive review and incisive views on quantum image ... read more

Driver Privacy Can Be Compromised in Usage-Based Insurance Systems

Apr. 7, 2017 — An attacker only needs one part of the information provided to a UBI company to discover a driver's whereabouts, home, work, or who they met with, report ... read more

Few Keep Track of Their Personal Data on Online

Apr. 4, 2017 — According to a study by computer science researchers, few people know how their personal data are collected, used, shared and accessed. The new EU General Data Protection Regulation (GDPR), coming ... read more

Mar. 28, 2017 — A prototype gadget that sends secret keys to encrypt information passed from a mobile device to a payment terminal, could help to answer public concerns around the security of contactless and ... read more

Desktop Scanners Can Be Hijacked to Perpetrate Cyberattacks

Mar. 28, 2017 — The researchers conducted several demonstrations to transmit a message into computers connected to a flatbed scanner. Using direct laser light sources up to a half-mile (900 meters) away, as well as ... read more

Protecting Web Users' Privacy

Mar. 23, 2017 — A new system has been developed that uses function secret sharing to disguise database queries during web-service transactions. The system could prevent price gouging and unwanted user ... read more

Connected Dolls and Tell-Tale Teddy Bears: Why We Need to Manage the Internet of Toys

Mar. 23, 2017 — Action is needed to monitor and control the emerging Internet of Toys, concludes a new report. Privacy and security are highlighted as main areas of ... read more

Computing: Is Fog More Secure Than Cloud?

Mar. 16, 2017 — Computer scientists are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting ... read more

YouTube Users Be Aware: Your Viewing Habits Can Be Tracked

Mar. 15, 2017 — It's important to know that video encryption is not as secure as once thought. Google, YouTube's parent company, is not likely to patch the gaps, since it would be prohibitively expensive ... read more

Mar. 15, 2017 — For the first time, researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a ... read more

Early Warning System for Mass Cyber Attacks

Mar. 15, 2017 — Mass attacks from the Internet are a common fear: Millions of requests in a short time span overload online services, grinding them to a standstill for hours and bringing Internet companies to their ... read more

Mar. 14, 2017 — Sound waves could be used to hack into critical sensors in a broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things, new research ... read more

Mar. 13, 2017 — Scientists have developed a facile route to a highly magnetic material that could provide fundamental improvements to the performance of current computer ... read more

Mar. 13, 2017 — Scientists have invented a new technology entitled “lip motion password” (lip password) which utilizes a person’s lip motions to create a ... read more

Once Overlooked, Uninitialized-Use 'Bugs' May Provide Portal for Hacker Attacks on Linux

Mar. 2, 2017 — According to new research, uninitialized variables -­- largely overlooked bugs mostly regarded as insignificant memory errors -- are actually a critical attack vector that can be reliably exploited ... read more

Mathematician Breaks Down How to Defend Against Quantum Computing Attacks

Feb. 28, 2017 — Newly written code, called the Generalized Knapsack Code, could thwart hackers armed with next generation quantum ... read more

Cameras Can Steal Data from Computer Hard Drive LED Lights, Study Finds

Feb. 22, 2017 — Researchers have found that once malware is on a computer, it can indirectly control a hard-drive (HDD) activity LED, turning it on and off rapidly (thousands of flickers per second) -- a rate that ... read more

Feb. 13, 2017 — Cybersecurity researchers have developed a new form of ransomware that can take over control of a simulated water treatment plant. After gaining access, they were able to command programmable logic ... read more

Monday, May 8, 2017
Saturday, April 29, 2017
Tuesday, April 11, 2017
Friday, April 7, 2017
Tuesday, April 4, 2017
Tuesday, March 28, 2017
Thursday, March 23, 2017
Thursday, March 16, 2017
Wednesday, March 15, 2017
Tuesday, March 14, 2017
Monday, March 13, 2017
Thursday, March 2, 2017
Tuesday, February 28, 2017
Wednesday, February 22, 2017
Monday, February 13, 2017
Friday, February 10, 2017
Friday, February 3, 2017
Monday, January 23, 2017
Wednesday, January 18, 2017
Thursday, January 12, 2017
Thursday, January 5, 2017
Saturday, December 24, 2016
Wednesday, December 21, 2016
Wednesday, December 14, 2016
Tuesday, December 6, 2016
Monday, November 21, 2016
Wednesday, November 16, 2016
Monday, November 7, 2016
Monday, October 31, 2016
Thursday, October 27, 2016
Tuesday, October 25, 2016
Monday, October 24, 2016
Friday, October 21, 2016
Thursday, October 20, 2016
Tuesday, October 18, 2016
Tuesday, October 11, 2016
Monday, October 3, 2016
Friday, September 30, 2016
Thursday, September 29, 2016
Tuesday, September 27, 2016
Wednesday, September 21, 2016
Friday, September 16, 2016
Friday, September 9, 2016
Thursday, September 8, 2016
Wednesday, September 7, 2016
Thursday, September 1, 2016
Monday, August 29, 2016
Thursday, August 25, 2016
Friday, August 19, 2016
Wednesday, August 17, 2016
Thursday, August 11, 2016
Friday, August 5, 2016
Wednesday, July 27, 2016
Tuesday, July 19, 2016
Wednesday, July 13, 2016
Monday, July 11, 2016
Tuesday, June 28, 2016
Thursday, June 23, 2016
Monday, June 20, 2016
Friday, June 17, 2016
Thursday, June 16, 2016
Thursday, June 9, 2016
Wednesday, June 8, 2016
Wednesday, June 1, 2016
Monday, May 23, 2016
Monday, May 16, 2016
Thursday, May 12, 2016
Tuesday, May 10, 2016
Monday, May 9, 2016
Wednesday, May 4, 2016
Wednesday, April 27, 2016
Friday, April 15, 2016
Thursday, April 14, 2016
Wednesday, April 13, 2016
Tuesday, April 12, 2016
Thursday, April 7, 2016
Tuesday, April 5, 2016
Friday, April 1, 2016
Thursday, March 24, 2016
Monday, March 21, 2016
Friday, March 18, 2016