Hacking News
September 9, 2016

Latest Headlines
updated 12:48am EDT

More Hacking News
September 9, 2016

One in Two Users Click on Links from Unknown Senders

Aug. 29, 2016 — Most people know that e-mails and Facebook messages from unknown senders can contain dangerous links. However, many users still click on them and researchers have investigated why. The results: up to ... read more

Researchers Find Vulnerabilities in iPhone, iPad Operating System

Aug. 25, 2016 — An international team of computer science researchers has identified serious security vulnerabilities in the iOS -- the operating system used in Apple's iPhone and iPad devices. The ... read more

Cybersecurity Student Researches How to Keep Cars Safe from Hacking

Aug. 19, 2016 — Cybersecurity student researches spent the summer researching how to keep cars safe from cyberattacks during an intensive eight-week cybersecurity summer research ... read more

New Hacking Technique Imperceptibly Changes Memory of Virtual Servers

Aug. 11, 2016 — For the first time ever a team of Dutch hacking experts managed to alter the memory of virtual machines in the cloud without a software bug, using a new attack ... read more

More Efficient Way to Write Data Into Non-Volatile Memory Devices Improves Performance

July 27, 2016 — A scheme to write data into next generation memory chips has been developed. The proposal requires considerably fewer resources to write data safely into memory -- even during a system ... read more

July 11, 2016 — Bioengineers in the United States have developed a new method for encrypting and storing sensitive information in DNA. Digital data storage degrades and can become obsolete and old-school books and ... read more

Brilliant Hard Drive Quality With Magnetic Field Sensors Made of Diamond

June 30, 2016 — Quantum mechanics is not only of high interest in fundamental research. The current progress in quantum technologies promises numerous innovations of industrial relevance, which will be transferred ... read more

June 28, 2016 — Camera-equipped smartphones, laptops and other devices make it possible to share ideas and images with anyone, anywhere, often in real-time. But in our cameras-everywhere culture, the risks of ... read more

Visual Cloud Computing Methods Could Help First Responders in Disaster Scenarios

June 23, 2016 — Visual data created by numerous security cameras, personal mobile devices and aerial video provide useful data for first responders and law enforcement. That data can be critical in terms of knowing ... read more

Fixing Vulnerabilities in Internet Encryption Protocol Transport Layer Security

June 20, 2016 — The Internet encryption protocol TLS – short for Transport Layer Security – is being fundamentally modified. Involved in attacks, researchers have contributed to revealing security gaps in the ... read more

FBI Approach to Investigations Puts Security at Risk, Experts Say

June 16, 2016 — Experts say the FBI's efforts to compel Apple to write software to unlock an iPhone used by a terrorist reflects an outdated approach to law enforcement that threatens to weaken smartphones ... read more

June 9, 2016 — IT security experts are developing a new method for detecting and fixing vulnerabilities in the applications run on different devices – regardless of the processor integrated in the respective ... read more

June 8, 2016 — New research raises concerns about how easily hackers could take control of flying drones and land or, more drastically, crash ... read more

June 1, 2016 — A characteristic called systemizing provides insight into what makes and motivates a hacker, says new ... read more

Computing a Secret, Unbreakable Key

May 23, 2016 — What once took months by some of the world's leading scientists can now be done in seconds by undergraduate students thanks to new software, paving the way for fast, secure quantum ... read more

New Method of Producing Random Numbers Could Improve Cybersecurity

May 16, 2016 — A new method for producing truly random numbers could be used to encrypt data, make electronic voting more secure, conduct statistically significant polls and more accurately simulate complex systems ... read more

Social Engineering: Password in Exchange for Chocolate

May 12, 2016 — It requires a lot of effort and expense for computer hackers to program a Trojan virus and infiltrate individual or company computers. They are therefore increasingly relying on psychological ... read more

New Design of Primitive Quantum Computer Finds Application

May 10, 2016 — Scientists and engineers have developed how to efficiently simulate a 'quantum walk' on a new design for a primitive quantum ... read more

Evaluating Patient Files Without Violating Privacy

May 9, 2016 — Patient files may contain vital hints for detecting diseases at an early stage. However, evaluating them would violate patient privacy. This is where mathematics can help, say ... read more

Not So Safe: Security Software Can Put Computers at Risk

May 4, 2016 — Is the antivirus program running on your computer really making your computers safer to use, say, for online banking? Is the parental control software you bought to keep your child off inappropriate ... read more

Monday, August 29, 2016
Thursday, August 25, 2016
Friday, August 19, 2016
Thursday, August 11, 2016
Wednesday, July 27, 2016
Monday, July 11, 2016
Thursday, June 30, 2016
Tuesday, June 28, 2016
Thursday, June 23, 2016
Monday, June 20, 2016
Thursday, June 16, 2016
Thursday, June 9, 2016
Wednesday, June 8, 2016
Wednesday, June 1, 2016
Monday, May 23, 2016
Monday, May 16, 2016
Thursday, May 12, 2016
Tuesday, May 10, 2016
Monday, May 9, 2016
Wednesday, May 4, 2016
Wednesday, April 27, 2016
Friday, April 15, 2016
Thursday, April 14, 2016
Wednesday, April 13, 2016
Tuesday, April 12, 2016
Tuesday, April 5, 2016
Friday, April 1, 2016
Thursday, March 24, 2016
Monday, March 21, 2016
Friday, March 18, 2016
Thursday, March 17, 2016
Friday, March 11, 2016
Thursday, March 10, 2016
Wednesday, March 9, 2016
Tuesday, March 8, 2016
Thursday, March 3, 2016
Wednesday, March 2, 2016
Tuesday, March 1, 2016
Monday, February 29, 2016
Wednesday, February 24, 2016
Tuesday, February 23, 2016
Monday, February 22, 2016
Friday, February 19, 2016
Tuesday, February 16, 2016
Wednesday, February 10, 2016
Wednesday, February 3, 2016
Monday, February 1, 2016
Wednesday, December 23, 2015
Friday, December 18, 2015
Tuesday, December 15, 2015
Thursday, December 10, 2015
Wednesday, December 9, 2015
Monday, December 7, 2015
Wednesday, December 2, 2015
Friday, November 20, 2015
Thursday, November 19, 2015
Monday, November 16, 2015
Wednesday, November 11, 2015
Tuesday, November 10, 2015
Thursday, November 5, 2015
Thursday, October 29, 2015
Wednesday, October 28, 2015
Friday, October 23, 2015
Tuesday, October 20, 2015
Saturday, October 17, 2015
Tuesday, October 13, 2015
Friday, October 9, 2015
Wednesday, October 7, 2015
Monday, October 5, 2015
Tuesday, September 29, 2015
Friday, September 25, 2015
Thursday, September 24, 2015
Wednesday, September 23, 2015
Tuesday, September 22, 2015
Monday, September 21, 2015
Thursday, September 10, 2015
Monday, August 24, 2015
Thursday, August 20, 2015
Tuesday, August 18, 2015
Thursday, August 13, 2015
Wednesday, August 12, 2015
Tuesday, August 11, 2015
Tuesday, August 4, 2015
Monday, August 3, 2015