Research Research

Coverage of new security research as it emerges from the industry trenches. You'll find articles including security conference coverage, snapshots of technical papers and videos.

Apple App Store misses backdoored apps

Apple App Store misses backdoored apps

App could silently tweet, compromise Safari.
Darren Pauli Aug 19 2013 3:00PM Security
Twitter eyes scam-busting signatures

Twitter eyes scam-busting signatures

New research crushes 95 percent of spambots.
Darren Pauli Aug 15 2013 1:17PM Security
CSIRO sets up new data analytics research division

CSIRO sets up new data analytics research division

Attempting to harness big data.
Juha Saarinen Aug 6 2013 7:35AM Training & Development
Charger can wipe iPhones, install malware

Charger can wipe iPhones, install malware

Apple plans iOS 7 fix.
Danielle Walker Aug 2 2013 7:00AM Security
Students hijack luxury yacht with GPS spoofing

Students hijack luxury yacht with GPS spoofing

No alarms triggered.
Juha Saarinen Jul 30 2013 9:23AM Security
Network King of the Hill: The fun and lazy hacker CTF

Network King of the Hill: The fun and lazy hacker CTF

A simple and dynamic hacking competition.
Darren Pauli Jul 25 2013 6:00AM Security
Study finds bug bounties an economic incentive

Study finds bug bounties an economic incentive

Chrome and Firefox run efficient vuln schemes.
Adam Greenberg Jul 15 2013 6:01AM Security
Pen testing firm pulls DEF CON talk over Fed exclusion

Pen testing firm pulls DEF CON talk over Fed exclusion

Says DEF CON should 'encourage openness'.
Darren Pauli Jul 12 2013 2:02PM Security
Flaw makes Android phones open to hijacking

Flaw makes Android phones open to hijacking

Signatures silently modified.
Darren Pauli Jul 4 2013 11:17AM Security
NZ research network gets terabit connectivity upgrade

NZ research network gets terabit connectivity upgrade

International transit upgrade considered too.
Juha Saarinen Jul 4 2013 9:30AM Telco/ISP
Game of Memory could out bots online

Game of Memory could out bots online

Subtle differences in brain function too expensive for bot writers to apply.
Darren Pauli Jul 3 2013 5:51PM Security
Signcryption author Yuliang Zheng on standardising and patenting research

Signcryption author Yuliang Zheng on standardising and patenting research

Leading economies stand out for its ability to protect intellectual property rights and to commercialise and standardise solutions.
Darren Pauli Jul 2 2013 1:22PM Security
Researcher hijacks Facebook accounts from mobiles

Researcher hijacks Facebook accounts from mobiles

Source code altered.
Dan Kaplan Jun 27 2013 11:00AM Security
Slow work internet 'frustrates' Aussies

Slow work internet 'frustrates' Aussies

As does browser lockdown and download permissions.
Ry Crozier Jun 7 2013 12:36PM Telco/ISP
HbbTV holes make tellys hackable

HbbTV holes make tellys hackable

Turns TVs into Bitcoin mining slaves.
Darren Pauli Jun 5 2013 12:06PM Security
Music could trigger mobile malware

Music could trigger mobile malware

Heavy bass beats could lead to ownage.
Shona Ghosh May 20 2013 9:00AM Security
Researchers find backdoor to Google Australia's office system

Researchers find backdoor to Google Australia's office system

Management system unpatched.
Darren Pauli May 8 2013 1:51PM Security
Researchers gain root to Google Australia's office system

Researchers gain root to Google Australia's office system

Management system unpatched.
Darren Pauli May 8 2013 9:46AM Security
Java broken by new sandbox bypass

Java broken by new sandbox bypass

Attack kits updated.
Danielle Walker Apr 24 2013 8:00AM Security
BAE Systems Detica launches cyber event analysis tool

BAE Systems Detica launches cyber event analysis tool

BAE Systems Detica is to launch a tool that combines Big Data analytics with event analysis and investigation tools.
Dan Raywood Apr 23 2013 8:00AM Security

Log In

  |  Forgot your password?