Can an MP3 hack your car?
(PhysOrg.com) -- The idea that someone can get into your car without your permission isn't a new one. It's about as old as the coat hanger, but that was back in the days when you locks had a pull up...
View ArticleIMF targeted in cyberattack, extent not disclosed
(AP) -- The International Monetary Fund, already reeling from last month's arrest of its former leader, is investigating an attack on its computer system.
View ArticleStaggering surge in Android gadget viruses: Juniper
The arsenal of malicious code aimed at Android-powered gadgets has grown exponentially, with criminals hiding viruses in applications people download to devices, according to Juniper Networks.
View ArticleJob-seeking Hungarian pleads guilty to hacking
A Hungarian man pleaded guilty Wednesday to hacking into the computer systems of the Marriott hotel chain and threatening to reveal confidential information unless he was given a job.
View ArticleHP slams 'sensational' reports about LaserJet printer hack vulnerability
(PhysOrg.com) -- Columbia University researchers have demonstrated how hackers can use printers not only to infect computer systems and steal information but to set printers on fire. Their claims were...
View ArticleRomanians charged in US with computer fraud
Four Romanians have been charged with hacking into the computer systems of hundreds of US merchants and making millions of dollars in purchases with stolen credit card data, the Justice Department said...
View ArticleMalware rebirthing suites intensify security arms race
New breeds of malware could leave computer systems and even critical infrastructure defenseless to attack from cyber criminals or foreign governments.
View ArticleCountries consider time out on the 'leap second'
It's high noon for the humble leap second. After ten years of talks, governments are headed for a showdown vote this week on an issue that pits technological precision against nature's whims.
View ArticleStudy analyzes emotions in software engineering
Emotions are an important factor that must be taken into account when designing any type of software. This is the conclusion reached through a research project coordinated by the Universidad Carlos III...
View ArticleList of targets of arrested computer hackers
The five computer hackers charged in New York on Tuesday and a sixth who pleaded guilty are accused of involvement in some of the most notorious hacking incidents of the past 18 months.
View ArticleHacker arrested in NYC cooperated from Day 1
(AP) -- An elite computer hacker who stunned fellow Internet saboteurs by becoming an FBI informant didn't put up any resistance when agents first knocked on his door.
View ArticleOfficial: Iran oil industry safe after cyberattack
(AP) -- An Iranian official says the country's oil industry is working well despite an attack from hackers and a computer virus that targeted the sector's computer systems.
View ArticleStudents to demonstrate smart camera trap at new engineering competition
(Phys.org) -- Forget about building a better mouse trap. University of California, San Diego sophomore Riley Yeakle and his teammates have come up with a better camera trap, and they will be facing off...
View ArticleIndividual typing style gives key to user authentication
Your typing style is as individual as your fingerprints. Being able to use typing style to identify a change in users could be a vital security and forensic support for organisations such as banks, the...
View ArticleElectronic congestion in the microchips of the future
(Phys.org) -- Electrons within some materials can stick together like cars on a traffic jam. Swiss researchers studying promising materials for the future of electronics have been able to highlight...
View ArticleSecurity researchers in force at USENIX Security
Everybody who's anybody in the no-longer-arcane field of computer security is out in force in Bellevue, Wash., this week at the 21st USENIX Security Symposium, the leading computer systems and...
View ArticleHackers shifting to 'destruction': US cyber chief
Hackers are stepping up the intensity of their attacks, moving from "disruption" to "destruction" of key computer systems, the top US cyber-defense official said Monday.
View ArticleUS panel: China tech giants pose security threat (Update)
(AP)—American companies should avoid sourcing network equipment from China's two leading technology firms because they pose a national security threat to the United States, the House Intelligence...
View ArticleConfidential records breached at Fla. college
(AP)—Officials at a Florida Panhandle college say hackers accessed nearly 300,000 records in the school's computer systems that contains names, Social Security and bank routing numbers of students,...
View ArticleSwedish government to crack down on hackers
The Swedish government said on Thursday it planned to crack down on hackers, at a time when the sex assault allegations against WikiLeaks founder Julian Assange has made the country a target of...
View Article