Research Research

Coverage of new security research as it emerges from the industry trenches. You'll find articles including security conference coverage, snapshots of technical papers and videos.

Co-lo VMs busted by crypto attack

Co-lo VMs busted by crypto attack

Side-channel cache-sniffers steal keys.
Darren Pauli Nov 6 2012 2:47PM Security
Multiple critical flaws flagged in Sophos

Multiple critical flaws flagged in Sophos

Exploit could be "wormed within days".
Tom Espiner Nov 6 2012 7:56AM Security
Researcher creates tools to switch off PLCs

Researcher creates tools to switch off PLCs

System runs online without authentication.
Darren Pauli Nov 5 2012 12:33PM Security
Russian cyber crime prices fall

Russian cyber crime prices fall

Black market diversifies.
Tom Espiner Nov 1 2012 11:25AM Security
Researcher releases tools to switch off PLCs

Researcher releases tools to switch off PLCs

System runs online without authentication.
Darren Pauli Oct 29 2012 5:27PM Security
Researchers detail SSL implementation holes

Researchers detail SSL implementation holes

Developers caught out by 'rude' report.
Darren Pauli Oct 29 2012 11:01AM Security
Researchers detail laundry list of dodgy crypto deployments

Researchers detail laundry list of dodgy crypto deployments

Developer hits back at 'rude' research.
Darren Pauli Oct 26 2012 4:46PM Security
Researchers track devices over any 3G network

Researchers track devices over any 3G network

Industry watchdog investigates potential vulnerability.
Darren Pauli Oct 10 2012 7:00AM Security
Flaws allow 3G devices to be tracked

Flaws allow 3G devices to be tracked

Devices trackable over any 3G network.
Darren Pauli Oct 9 2012 10:57AM Security
Android phones open to remote wipe vulnerability

Android phones open to remote wipe vulnerability

Vendors slow to patch issue.
Juha Saarinen Sep 26 2012 9:21AM Security
Phonetic attack commands crash bank phone lines

Phonetic attack commands crash bank phone lines

Touch tone and voice activated systems open to attack.
Darren Pauli Sep 17 2012 5:46PM Security
Tool detects software plagiarism, theft and malware outbreaks

Tool detects software plagiarism, theft and malware outbreaks

Tracks applications across Windows and Linux.
Darren Pauli Sep 13 2012 4:21PM Security
Illegal fire-sharers tapped directly by 'monitors'

Illegal fire-sharers tapped directly by 'monitors'

Four in ten log IP address within three hours.
Staff Writers Sep 5 2012 4:36PM Networking
Software maps criminal networks

Software maps criminal networks

Phone calls, social networks on the radar.
Juha Saarinen Aug 27 2012 4:56PM Security
Researchers hide crypto keys on terabyte disc

Researchers hide crypto keys on terabyte disc

Tiny, polarised rods to boost security.
Darren Pauli Aug 20 2012 7:00AM Security
Melbourne researchers hide crypto keys on terabyte disc

Melbourne researchers hide crypto keys on terabyte disc

Tiny, polarised rods to boost security.
Darren Pauli Aug 17 2012 2:30PM Security
Anti-phishing phone bug trial begins

Anti-phishing phone bug trial begins

Banks to freeze accounts during phone phishing calls.
Darren Pauli Aug 9 2012 12:12PM Security
Swinburne researchers seek out IPv4 remains

Swinburne researchers seek out IPv4 remains

Call on network operators to help.
Caitlin Fitzsimmons Aug 3 2012 12:30PM Networking
Highly persistent backdoor infects BIOS, peripherals

Highly persistent backdoor infects BIOS, peripherals

Malware hides from forensic analysis.
Darren Pauli Aug 3 2012 12:31AM Security
#BlackHat: Researchers bypass iris scanners with biometric clones

#BlackHat: Researchers bypass iris scanners with biometric clones

Researchers tap templates.
Marcos Colon Jul 30 2012 12:37PM Security

Log In

  |  Forgot your password?