Research Research

Coverage of new security research as it emerges from the industry trenches. You'll find articles including security conference coverage, snapshots of technical papers and videos.

Prototype rootkit silently modifies Android apps

Prototype rootkit silently modifies Android apps

Installed web browser replaced with keylogger doppelganger.
Darren Pauli Jul 4 2012 10:43AM Security
RSA tokens 'broken' in 13 minutes

RSA tokens 'broken' in 13 minutes

The fragility of authentication tokens against established attack vectors have been detailed.
Dan Raywood Jun 27 2012 12:52PM Security
Hacker interrupts AVG's malware analysis

Hacker interrupts AVG's malware analysis

'Why are you researching my trojan?'
Darren Pauli Jun 25 2012 11:50AM Security
Diablo hacker springs reverse engineers

Diablo hacker springs reverse engineers

“Why are you researching my trojan?”
Darren Pauli Jun 21 2012 2:18PM Security
ANU to install 1.2 petaflop supercomputer

ANU to install 1.2 petaflop supercomputer

Fastest in the southern hemisphere.
Juha Saarinen Jun 18 2012 7:00AM Hardware
Researchers find holes in virtualisation platforms

Researchers find holes in virtualisation platforms

Multiple platforms affected.
Darren Pauli Jun 15 2012 5:24PM Security
Hackers having less success in draining bank accounts

Hackers having less success in draining bank accounts

Hijack attempts on the rise.
Dan Kaplan Jun 15 2012 7:47AM Security
ICS security firms targeted in phishing campaign

ICS security firms targeted in phishing campaign

Defence contractors, universities primed.
Darren Pauli Jun 14 2012 2:10PM Security
Virtualisation holes detailed on multiple platforms

Virtualisation holes detailed on multiple platforms

Local privileged escalation, virtual machine escapes possible.
Darren Pauli Jun 14 2012 10:46AM Security
Herpes bot master outed

Herpes bot master outed

Lax identity protection leads to downfall.
Darren Pauli May 24 2012 7:57PM Security
Targeted attacks cost biz $200k, study says

Targeted attacks cost biz $200k, study says

A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.
Marcos Colon May 23 2012 10:08AM Security
Australia included in global file-sharing research

Australia included in global file-sharing research

Hints more female pirates live Down Under.
Liam Tung May 10 2012 9:59AM Security
Pirate Bay backs global file-sharing research

Pirate Bay backs global file-sharing research

Is ‘Oceania’ home to the most active female pirates in the world?
Liam Tung May 10 2012 5:52AM Networking
Eavesdropper Android app developed

Eavesdropper Android app developed

Proof-of-concept application siphons audio to remote servers.
Darren Pauli May 8 2012 11:53AM Security
Execs toe IT line on cloud take-up

Execs toe IT line on cloud take-up

Debunking the myth of 'rogue' cloud consumption.
Ry Crozier May 8 2012 11:49AM Networking
Oracle issues workarounds for zero-day hole

Oracle issues workarounds for zero-day hole

Company moves after public disclosure.
Dan Kaplan May 3 2012 11:22AM Security
Off-the-shelf kits trigger record number of attacks

Off-the-shelf kits trigger record number of attacks

Malware variants more prevalent than ever.
Dan Kaplan May 1 2012 7:29AM Security
Public sector orgs flunk OWASP Top 10

Public sector orgs flunk OWASP Top 10

Research finds 84 per cent of web apps deemed unacceptable against security benchmarks.
Dan Raywood Apr 30 2012 7:54AM Security
Rackspace resolves 'dirty disk' vulnerability

Rackspace resolves 'dirty disk' vulnerability

Weak implementations allow dirty data to be tapped.
Staff Writers Apr 27 2012 3:45PM Security
BYOD shunned by British Defence

BYOD shunned by British Defence

Policy confuses everyone else
Dan Raywood Apr 26 2012 12:00PM Security

Log In

  |  Forgot your password?