research

Tool detects software plagiarism, theft and malware outbreaks

Tool detects software plagiarism, theft and malware outbreaks

Tracks applications across Windows and Linux.
Darren Pauli Sep 13 2012 4:21PM Security
Illegal fire-sharers tapped directly by 'monitors'

Illegal fire-sharers tapped directly by 'monitors'

Four in ten log IP address within three hours.
Staff Writers Sep 5 2012 4:36PM Networking
Software maps criminal networks

Software maps criminal networks

Phone calls, social networks on the radar.
Juha Saarinen Aug 27 2012 4:56PM Security
Researchers hide crypto keys on terabyte disc

Researchers hide crypto keys on terabyte disc

Tiny, polarised rods to boost security.
Darren Pauli Aug 20 2012 7:00AM Security
Melbourne researchers hide crypto keys on terabyte disc

Melbourne researchers hide crypto keys on terabyte disc

Tiny, polarised rods to boost security.
Darren Pauli Aug 17 2012 2:30PM Security
Anti-phishing phone bug trial begins

Anti-phishing phone bug trial begins

Banks to freeze accounts during phone phishing calls.
Darren Pauli Aug 9 2012 12:12PM Security
Swinburne researchers seek out IPv4 remains

Swinburne researchers seek out IPv4 remains

Call on network operators to help.
Caitlin Fitzsimmons Aug 3 2012 12:30PM Networking
Highly persistent backdoor infects BIOS, peripherals

Highly persistent backdoor infects BIOS, peripherals

Malware hides from forensic analysis.
Darren Pauli Aug 3 2012 12:31AM Security
#BlackHat: Researchers bypass iris scanners with biometric clones

#BlackHat: Researchers bypass iris scanners with biometric clones

Researchers tap templates.
Marcos Colon Jul 30 2012 12:37PM Security
Prototype rootkit silently modifies Android apps

Prototype rootkit silently modifies Android apps

Installed web browser replaced with keylogger doppelganger.
Darren Pauli Jul 4 2012 10:43AM Security
RSA tokens 'broken' in 13 minutes

RSA tokens 'broken' in 13 minutes

The fragility of authentication tokens against established attack vectors have been detailed.
Dan Raywood Jun 27 2012 12:52PM Security
Hacker interrupts AVG's malware analysis

Hacker interrupts AVG's malware analysis

'Why are you researching my trojan?'
Darren Pauli Jun 25 2012 11:50AM Security
Diablo hacker springs reverse engineers

Diablo hacker springs reverse engineers

“Why are you researching my trojan?”
Darren Pauli Jun 21 2012 2:18PM Security
ANU to install 1.2 petaflop supercomputer

ANU to install 1.2 petaflop supercomputer

Fastest in the southern hemisphere.
Juha Saarinen Jun 18 2012 7:00AM Hardware
Researchers find holes in virtualisation platforms

Researchers find holes in virtualisation platforms

Multiple platforms affected.
Darren Pauli Jun 15 2012 5:24PM Security
Hackers having less success in draining bank accounts

Hackers having less success in draining bank accounts

Hijack attempts on the rise.
Dan Kaplan Jun 15 2012 7:47AM Security
ICS security firms targeted in phishing campaign

ICS security firms targeted in phishing campaign

Defence contractors, universities primed.
Darren Pauli Jun 14 2012 2:10PM Security
Virtualisation holes detailed on multiple platforms

Virtualisation holes detailed on multiple platforms

Local privileged escalation, virtual machine escapes possible.
Darren Pauli Jun 14 2012 10:46AM Security
Herpes bot master outed

Herpes bot master outed

Lax identity protection leads to downfall.
Darren Pauli May 24 2012 7:57PM Security
Targeted attacks cost biz $200k, study says

Targeted attacks cost biz $200k, study says

A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.
Marcos Colon May 23 2012 10:08AM Security

Log In

  |  Forgot your password?