Nav: Home

Current Malware News and Events

Current Malware News and Events, Malware News Articles.
Sort By: Most Relevant | Most Viewed
Page 1 of 4 | 155 Results
$4.6 million award creates program to train cybersecurity professionals
A five-year, $4.63 million award from the National Science Foundation will enable a multi-disciplinary team of researchers at the University of Arkansas to create a program to recruit, educate and train the next generation of cybersecurity professionals. (2019-07-16)
New computer attack mimics user's keystroke characteristics and evades detection, according to Ben-Gurion University cyber researchers
'Our proposed detection modules are trusted and secured, based on information that can be measured from side-channel resources, in addition to data transmission,' Farhi says. (2019-06-06)
Illinois researchers add 'time-travel' feature to drives to fight ransomware attacks
One of the latest cyber threats involves hackers encrypting user files and then charging ''ransom'' to get them back. (2019-05-29)
Design flaws create security vulnerabilities for 'smart home' internet-of-things devices
NC State researchers find countermeasures for designers of security systems and other smart home devices. (2019-05-02)
New technique uses power anomalies to ID malware in embedded systems
Researchers have developed a technique for detecting types of malware that use a system's architecture to thwart traditional security measures. (2019-04-25)
Better security achieved with randomly generating biological encryption keys
Data breaches, hacked systems and hostage malware are frequently topics of evening news casts -- including stories of department store, hospital, government and bank data leaking into unsavory hands -- but now a team of engineers has an encryption key approach that is unclonable and not reverse-engineerable, protecting information even as computers become faster and nimbler. (2018-12-19)
How a personality trait puts you at risk for cybercrime
Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. (2018-12-17)
Research finds bots and Russian trolls influenced vaccine discussion on Twitter
Social media bots and Russian trolls promoted discord and spread false information about vaccines on Twitter using tactics similar to those at work during the 2016 United States presidential election, according to new research led by the George Washington University. (2018-08-23)
New malicious email detection method that outperforms 60 antivirus engines -- Ben-Gurion
They compared their detection model to 60 industry-leading antivirus engines as well as previous research, and found their system outperformed the next best antivirus engine by 13 percent -- significantly better than such products including Kaspersky, MacAfee and Avast. (2018-07-19)
Off-the-shelf smart devices found easy to hack
'It only took 30 minutes to find passwords for most of the devices and some of them were found only through a Google search of the brand,' says Omer Shwartz, a Ph.D. student and member of Dr. (2018-03-13)
Can your cardiac device be hacked?
Medical devices, including cardiovascular implantable electronic devices could be at risk for hacking. (2018-02-20)
Bitcoin wallet devices vulnerable to security hacks, study shows
Devices used to manage accounts using Bitcoin could be improved to provide better protection against hackers, according to research by University of Edinburgh scientists. (2018-01-23)
First method to detect illicit drone filming developed
'The beauty of this research is that someone using only a laptop and an object that flickers can detect if someone is using a drone to spy on them,' says Ben Nassi, a Ph.D. student in the BGU Department of Software and Information Systems Engineering and a researcher at the BGU Cyber Security Research Center (CSRC). (2018-01-12)
First white-box testing model finds thousands of errors in self-driving cars
Researchers from Lehigh University and Columbia University shine a light into the black box of deep learning systems with DeepXplore, the first automated white-box testing of such systems. (2017-10-25)
Security cameras are vulnerable to attacks using infrared light -- Ben Gurion U. study
The cyber team led by Dr. Mordechai Guri, head of research and development for BGU's Cyber Security Research Center (CSRC), shows how IR can be used to create a covert communication channel between malware installed on an internal computer network and an attacker located hundreds of yards outside or even miles away with direct line of sight. (2017-09-19)
Network traffic provides early indication of malware infection
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. (2017-05-21)
Combination of features produces new Android vulnerability
A new vulnerability affecting Android mobile devices results not from a traditional bug, but from the malicious combination of two legitimate permissions that power desirable and commonly used features in popular apps. (2017-05-21)
Under cyber attack: UH researchers look at how to catch a 'phisher'
As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts at the University of Houston are 'phishing' for reasons why these types of attacks are so successful. (2017-05-16)
Weaponizing the internet for terrorism
Writing in the International Journal of Collaborative Intelligence, researchers from Nigeria suggest that botnets and cyber attacks could interfere with infrastructure, healthcare, transportation, and power supply to as devastating an effect as the detonation of explosives of the firing of guns. (2017-05-16)
Android apps can conspire to mine information from your smartphone
'What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone,' said researcher Gang Wang. (2017-04-03)
Desktop scanners can be hijacked to perpetrate cyberattacks
The researchers conducted several demonstrations to transmit a message into computers connected to a flatbed scanner. (2017-03-28)
New technique completely protects internet video from cyberattacks -- Ben-Gurion University study
To counter this emerging threat, Professor Hadar developed a series of algorithms that can completely prevent attackers from being able to infiltrate and extract information through videos or pictures. (2017-03-13)
Staying a heartbeat ahead of hackers
Nearly a million new forms of malware are unleashed on the world every day. (2017-03-08)
Cameras can steal data from computer hard drive LED lights -- Ben-Gurion U. study
The research team utilized the hard-drive (HDD) activity LED lights that are found on most desktop PCs and laptops. (2017-02-22)
NTU and FireEye join forces to grow the ranks of Singapore's cyber security experts
Nanyang Technological University, Singapore (NTU Singapore) and leading cyber security company FireEye are inking a partnership to explore new areas in cyber security research, and to develop courses to meet the rising demand for cyber security professionals needed to help defend critical networks. (2017-02-14)
Protecting bulk power systems from hackers
Most of us take turning the lights on for granted. (2017-02-10)
Your Android device's Pattern Lock can be cracked within 5 attempts
The popular Pattern Lock system used to secure millions of Android phones can be cracked within just five attempts -- and more complicated patterns are the easiest to crack, security experts reveal. (2017-01-23)
Bring your own (security) disaster
Bring your own device (BYOD) to work is common practice these days. (2016-12-14)
Malware that turns PCs into eavesdropping devices demonstrated by Ben-Gurion U.
Headphones, earphones and speakers are physically built like microphones and that an audio port's role in the PC can be reprogrammed from output to input creates a vulnerability that can be abused by hackers. (2016-11-22)
CyLab researchers create network traffic visualization tool to help thwart cyber attacks
Carnegie Mellon CyLab researchers Yang Cai and Sebastian Peryt have created a tool that allows one to visualize network traffic to more easily identify key changes and patterns. (2016-11-07)
Researchers want to use hardware to fight computer viruses
Fighting computer viruses isn't just for software anymore. Binghamton University researchers will use a grant from the National Science Foundation to study how hardware can help protect computers too. (2016-11-07)
Researchers find weakness in common computer chip
Researchers from Binghamton University, State University of New York and University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. (2016-10-25)
Game theory: Army of agents to tackle corrupt officials, tax evaders, terrorists
Game theory has long been used to apply mathematical models of conflict and cooperation between intelligent rational decision-makers. (2016-10-20)
Study finds 'lurking malice' in cloud hosting services
A study of 20 major cloud hosting services has found that as many as 10 percent of the repositories hosted by them had been compromised -- with several hundred of the 'buckets' actively providing malware. (2016-10-18)
Cyber Security Survey reveals darknet use higher among 18- to 24-year-olds
The survey, now in its third year, also revealed that at least 4 percent of British adults have been victims of ransomware, where their computer has had malware installed, which encrypts their data and then faced demands for a payment to restore it back to normal. (2016-09-06)
New hacking technique imperceptibly changes memory virtual servers
For the first time ever a team of Dutch hacking experts, led by cyber security professor Herbert Bos at Vrije Universiteit Amsterdam, managed to alter the memory of virtual machines in the cloud without a software bug, using a new attack technique. (2016-08-11)
NYU, Google researchers hack business model of adware, scareware, other unwanted software
A team of researchers from Google and the New York University Tandon School of Engineering next week will offer the first public view into practices that deliver unwanted advertising and software bundled with legitimate downloads. (2016-08-04)
Researchers raise more than $2 million to rethink cybersecurity
EPFL professor George Candea founded Cyberhaven, a startup that is developing a brand new approach to computer security. (2016-07-28)
To catch a wireless thief
University of Utah School of Computing professor Sneha Kumar Kasera and his team of researchers are tasked with creating a system that allows cellphone and laptop users to help detect and locate someone who is stealing bandwidth on radio frequency waves. (2016-07-19)
Extortion extinction
Ransomware -- what hackers use to encrypt your computer files and demand money in exchange for freeing those contents -- is an exploding global problem with few solutions, but a team of University of Florida researchers says it has developed a way to stop it dead in its tracks. (2016-07-08)
Page 1 of 4 | 155 Results
   First   Previous   Next      Last   

Best Science Podcasts 2019

We have hand picked the best science podcasts for 2019. Sit back and enjoy new science podcasts updated daily from your favorite science news services and scientists.
Now Playing: TED Radio Hour

Anthropomorphic
Do animals grieve? Do they have language or consciousness? For a long time, scientists resisted the urge to look for human qualities in animals. This hour, TED speakers explore how that is changing. Guests include biological anthropologist Barbara King, dolphin researcher Denise Herzing, primatologist Frans de Waal, and ecologist Carl Safina.
Now Playing: Science for the People

#SB2 2019 Science Birthday Minisode: Mary Golda Ross
Our second annual Science Birthday is here, and this year we celebrate the wonderful Mary Golda Ross, born 9 August 1908. She died in 2008 at age 99, but left a lasting mark on the science of rocketry and space exploration as an early woman in engineering, and one of the first Native Americans in engineering. Join Rachelle and Bethany for this very special birthday minisode celebrating Mary and her achievements. Thanks to our Patreons who make this show possible! Read more about Mary G. Ross: Interview with Mary Ross on Lash Publications International, by Laurel Sheppard Meet Mary Golda...