Research Research

Coverage of new security research as it emerges from the industry trenches. You'll find articles including security conference coverage, snapshots of technical papers and videos.

WA astronomers to crowdsource data processing

WA astronomers to crowdsource data processing

TheSkyNet taps social networking for spare computing power.
Liz Tay Sep 14 2011 6:43AM Software
Mobile malware up 273%, vendor says

Mobile malware up 273%, vendor says

New strain detected on average every 12 seconds.
SC Staff Sep 14 2011 3:50AM Security
Cybercrime costs $367b a year. Really?

Cybercrime costs $367b a year. Really?

Digital crime rivals illegal drug trade, says Symantec.
Angela Moscaritolo Sep 8 2011 2:10PM Security
3M to make e-glue for IBM's 3D processors

3M to make e-glue for IBM's 3D processors

Silicon skyscrapers for smartphones by 2013.
Liam Tung Sep 8 2011 6:41AM Hardware
Death worm phones home over DNS

Death worm phones home over DNS

The Windows Morto worm uses DNS TXT records to contact servers.
Angela Moscaritolo Sep 1 2011 10:19AM Security
Next-gen telco chip to speed up submarine links

Next-gen telco chip to speed up submarine links

Coherent system to overcome fibre bandwidth limits.
Liz Tay Aug 26 2011 11:55AM Telco/ISP
Crims on top of mobile game says expert

Crims on top of mobile game says expert

Malware with root access a sign of the times.
Dan Kaplan Aug 26 2011 11:12AM Security
Attacking the 24x7 grind

Attacking the 24x7 grind

Is your workplace culture keeping women out of senior roles?
Ry Crozier Aug 25 2011 3:16PM Strategy
Manual vulnerability discovery gets smarter, faster

Manual vulnerability discovery gets smarter, faster

Automated vulnerability research falls short.
Darren Pauli Aug 22 2011 2:56PM Security
Physicists curve light on metal 'chip'

Physicists curve light on metal 'chip'

Applications hinge on development of plasmonic circuits.
Liz Tay Aug 17 2011 3:22PM Hardware
Greens call for more national R&D funding

Greens call for more national R&D funding

MP recommends commitment of at least three percent of GDP.
Liz Tay Aug 9 2011 4:02PM Financial Services
Fingerprint tech sniffs coffee, cigarettes

Fingerprint tech sniffs coffee, cigarettes

Biometric tech tracks what suspects have been touching.
Miya Knights Aug 9 2011 9:53AM Security
Ad agency stealing web history

Ad agency stealing web history

Ignores do-not-track requests.
Stewart Mitchell Jul 21 2011 11:33AM Security
Auditors choose profits over security

Auditors choose profits over security

Study reveals oversights in Aussie organisations.
Darren Pauli Jul 20 2011 11:27AM Security
Lazy auditors lay Australia's security bare

Lazy auditors lay Australia's security bare

"Lowest common denominator" approach and groupthink expose organisations to risk.
Darren Pauli Jul 15 2011 3:38PM Security
Swinburne commissions hybrid 130-TFLOP machine

Swinburne commissions hybrid 130-TFLOP machine

New supercomputer to be deployed by September.
Liz Tay Jul 13 2011 12:40PM Hardware
Federated Identity flourishing

Federated Identity flourishing

Standards are maturing just in time for identity federations to meet the new demands for cloud and mobile access.
Deb Radcliff Jul 12 2011 2:18PM Security
AARNet to roll out telepresence exchange

AARNet to roll out telepresence exchange

Agrees to connect local, international universities with Cisco.
Liz Tay Jul 6 2011 3:00PM Hardware
Trojan talks over Tor

Trojan talks over Tor

Malware traffic gets anonymised, encrypted.
Darren Pauli Jun 29 2011 1:13PM Security
Security researchers find IE zero-day

Security researchers find IE zero-day

Attacker runs two zero-days from one server.
SC Australia Staff Jun 28 2011 8:55PM Security

Log In

  |  Forgot your password?