Hacking Linux: Exploit Bypasses Security Measures

Recently, a security researcher Chris Evans released a well-written exploit that uses rather unusual methods to exploit memory corruption vulnerability in Gstreamer. There are two security protections built into Linux – address space layout randomization (ASLR) and data execution protection (DEP). The second one is meant to block an exploit’s ability to load into memory …

Don’t Reuse Similar Passwords

New research shows that reusing similar passwords across multiple online accounts may make you more vulnerable to hackers’ guessing. In other words, it appears that online password guessing is severely underestimated. Targeted online guessing is when cyber criminals guess a specific victim’s password for an account. How can they just guess someone’s password, you ask? …

Internet Usage: Mobile Devices Surpass Computers

A new research conducted by the internet monitoring firm StatCounter reveals that for the first time, mobile devices have surpassed computers when it comes to internet usage. The research showed that the combined traffic from smartphones and tablet devices tipped the balance at 51.2%, vs. 48.7% for desktop access. While this might not come as …

PREDATOR: A Tool That Detects Malicious Websites Before They Cause Harm

As we all unfortunately know, malicious websites that promote scams and distribute malware pervade the web. To make matters worse, blocking or blacklisting those websites doesn’t help much. This is because criminals who create malicious websites can easily set up new domain names to support their activities after they’ve been blocked or blacklisted. The good …

Detecting Online Dishonesty

Dishonestly posting online comments, tweets or reviews might not be illegal but is certainly ethically-questionable. Now, researchers from the University of Texas at San Antonio describe a new method for detecting online dishonesty, or “astroturfing”. Astroturfing has existed since the dawn of social media. It can be used for any number of reason: businesses can …

Skyping While Typing – Not A Good Idea

A new study suggests that typing on your keyboard while participating in a Skype call could make you vulnerable to electronic eavesdropping and therefore compromise your privacy. Researchers at the University of California, Irvine and in Italy explain that keystroke sounds can be recorded during a Skype video or voice call, and later analyzed and …

Our Ability to Spot Phishing Emails is Poor

It’s no secret that millions of phishing emails make their way to people’s inboxes every year. We expect that our email client’s spam filter will catch them, but a lot of them make it uncaught. Of those, many simply slide past our own judgment and are clicked and opened. A recent study has revealed what …

New Encryption Method Improves Authentication and Privacy Protection

VTT Technical Research Centre of Finland’s new encryption method combines safety, privacy protection, and usability to enable safer, easier-to-use, and more reliable user authentication. The traditional authentication that is based on passwords is actually pretty weak protection system. This is because users mostly select easy passwords so hackers often succeed in stealing large password databases. …

Moxie Marlinspike’s Crypto Protocol

Nowadays, since people life starts to rely their life on computers and internet, significance of encryption has been rise with it. Andy Greenberg, the author of the article “Meet Moxie Marlinspike, the anarchist bring encryption to all of us”, brought up with great achievement that has been never showed up in human history, which was …

Faster Internet With Terabit Networking

Terabit data speeds in fiber optics are nothing new – they have been here for years – but they haven’t been really practical until now. This is because fiber optic systems are complex and costly, so making them for commercial use is quite difficult. However, recently the Technical University of Munich, Nokia Bell Labs, and …

Design a site like this with WordPress.com
Get started