Research Research

Coverage of new security research as it emerges from the industry trenches. You'll find articles including security conference coverage, snapshots of technical papers and videos.

Holes found in Rackspace, VPS.Net cloud services

Holes found in Rackspace, VPS.Net cloud services

Weak implementations allow dirty data to be tapped.
SC Staff Apr 26 2012 11:06AM Security
Tough bug bounty programs exclude amateurs

Tough bug bounty programs exclude amateurs

Less critical flaws could go unreported.
Darren Pauli , Marcos Colon Apr 23 2012 10:32AM Security
Samsung TVs, Blu-ray vulnerable to eternal boot loop

Samsung TVs, Blu-ray vulnerable to eternal boot loop

Not your typical remote control.
Darren Pauli Apr 20 2012 8:10AM Security
Bug reports fall, bounties exclude amateurs

Bug reports fall, bounties exclude amateurs

Less critical flaws go unreported.
Darren Pauli , Marcos Colon Apr 19 2012 8:22AM Security
Security R&D centre to open in Melbourne

Security R&D centre to open in Melbourne

Research to focus on defence, search, deep packet inspection.
Staff Writers Apr 16 2012 2:37PM Security
SAIC to build Melbourne security R&D centre

SAIC to build Melbourne security R&D centre

Research to focus on defence, search, deep packet inspection.
Staff Writers Apr 16 2012 1:11PM Security
Android concept app siphons sensitive data

Android concept app siphons sensitive data

Application bypasses permissions to steal SD and app data.
Darren Pauli Apr 11 2012 11:12AM Security
Instructions published for DIY undetectable malware

Instructions published for DIY undetectable malware

Payload pounces from library.
Darren Pauli Apr 7 2012 4:34PM Security
NICTA validates hot rock algorithms in oil country

NICTA validates hot rock algorithms in oil country

Victorian region selected as test site.
Ry Crozier Mar 28 2012 7:30AM Software
Hacktivism tops 2011 data breach causes

Hacktivism tops 2011 data breach causes

Organisations suffer from politically motivated attacks.
Darren Pauli Mar 26 2012 11:10AM Security
Mobile vulnerabilities top IBM report

Mobile vulnerabilities top IBM report

Thousands of disclosures studied.
Marcos Colon Mar 24 2012 7:45AM Security
Hacktivism booms but SMBs still pwned by robots

Hacktivism booms but SMBs still pwned by robots

Hactivism more prolific than cybercrime, Verizon says.
Darren Pauli Mar 22 2012 4:46PM Security
Data breach costs drop for first time

Data breach costs drop for first time

Bucks six-year trend.
Dan Kaplan Mar 21 2012 11:39AM Security
Five million machines potentially vulnerable to RDP exploit

Five million machines potentially vulnerable to RDP exploit

Scan shows not just 'stupid users' are vulnerable.
Darren Pauli Mar 20 2012 5:21PM Security
Hack reaction caught on pwned webcams

Hack reaction caught on pwned webcams

Internet voting system hacked.
Staff Writers Mar 5 2012 1:44PM Security
Visa threatens banks over spammer accounts

Visa threatens banks over spammer accounts

Delinquent banks scared, shutter spammer bank accounts.
Darren Pauli Mar 5 2012 11:51AM Security
Visa threatens banks over spammer accounts

Visa threatens banks over spammer accounts

Delinquent banks scared, shutter spammer bank accounts.
Darren Pauli Mar 1 2012 6:00AM Security
DIY mobile phone tracking using open source

DIY mobile phone tracking using open source

Researchers locate target without help from phone carriers.
Darren Pauli Feb 21 2012 1:35PM Security
Trend Micro open sources spyware tool

Trend Micro open sources spyware tool

Hijack This pushed to SourceForge.
Staff Writer Feb 20 2012 12:32PM Security
Research offers software salvation from AV friendly-fire

Research offers software salvation from AV friendly-fire

Yet it is too underdeveloped to replace existing malware analysis.
Darren Pauli Feb 2 2012 7:07PM Security

Log In

  |  Forgot your password?