Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Google Kicks Out Largest Android Adware Family From The Play Store

Google Kicks Out Largest Android Adware Family From The Play Store
With the rise in the mobile market, Adware has become one of the most prevalent mobile threats in the world. Adware has traditionally been used to aggressively push ads like banners or pop-ups on mobile screens to make money.The troublesome part is that Adware is now becoming trojanized and more sophisticated, as it aggressively collects personal data from the mobile device it's installed on, including name, birth date, location, serial number, contacts, and browser data without users' consen…
Rate this blog entry:
Continue reading
179 Hits
0 Comments

Ultrashort light pulses for fast 'lightwave' computers

Ultrashort light pulses for fast
Extremely short, configurable "femtosecond" pulses of light demonstrated by an international team could lead to future computers that run up to 100,000 times faster than today's electronics. The researchers, including engineers at the University of Michigan, showed that they could control the peaks within the laser pulses and also twist the light. The method moves electrons faster and more efficiently than electrical currents -- and with reliable effects on their quantum states. It is a step tow…
Rate this blog entry:
Continue reading
233 Hits
0 Comments

Creation of highly magnetic material could improve computer technologies

Creation of highly magnetic material could improve computer technologies
Scientists, led by Professor Ian Manners from the University of Bristol's School of Chemistry, have developed a facile route to a highly magnetic material that could provide fundamental improvements to the performance of current computer technologies. Polymers, or plastics, which feature metal atoms in their structure have been a focus of much research in recent decades, and have found application in self-healing materials, photovoltaic technology, and information storage. Metal sandwich complex…
Rate this blog entry:
Continue reading
205 Hits
0 Comments

Scientists Store One Bit of Data on a Single Atom — Future of Data Storage

Scientists Store One Bit of Data on a Single Atom — Future of Data Storage
Imagine a pocket-sized hard drive capable of storing the entire list of 35 Million Songs?This isn't yet practical, but IBM has just taken a big step towards improving computing technology: IBM researchers just discovered a way to store data on a single atom.Data storage is undergoing dramatic evolution, recently researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in strands of DNA.The IBM Research results announc…
Rate this blog entry:
Continue reading
194 Hits
0 Comments

World’s first 'lip password' utilizes a user's lip motions to create password

World’s first
Professor Cheung Yiu-ming from the Department of Computer Science, Hong Kong Baptist University (HKBU), and his team has invented a new technology entitled “lip motion password” (lip password) which utilises a person’s lip motions to create a password. The use of biometric data such as fingerprints to unlock mobile devices and verify identity at immigration and customs counters are used around the world. Despite its wide application, one cannot change the scan of their fingerprint. Once the scan…
Rate this blog entry:
Continue reading
4 Hits
0 Comments

Nudging consumers into making better purchases online

Nudging consumers into making better purchases online
Small changes in the website design of online shops could significantly reduce the risk of incompatible purchases by customers, concludes a recent JRC study published on 10 March in PLOS ONE. Warning messages appealing to the customer's emotions and information provided at check-out were the most effective methods of avoiding disappointment. Have you ever bought a video game or a DVD online and only noticed when trying to use it, that it is not compatible with your device? While the digital mark…
Rate this blog entry:
Continue reading
160 Hits
0 Comments

Simultaneous detection of multiple spin states in a single quantum dot

Simultaneous detection of multiple spin states in a single quantum dot
Quantum dots are very small particles that exhibit luminescence and electronic properties different from those of their bulk materials. As a result, they are attractive for use in solar cells, optoelectronics, and quantum computing. Quantum computing involves applying a small voltage to quantum dots to regulate their electron spin state, thus encoding information. While traditional computing is based on a binary information system, electron spin states in quantum dots can display further degrees…
Rate this blog entry:
Continue reading
133 Hits
0 Comments

Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones

Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones
Bought a brand new Android Smartphone? Do not expect it to be a clean slate.At least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by two unidentified companies have been found pre-loaded with malware programs.These malware infected devices were identified after a Check Point malware scan was performed on Android devices. Two malware families were detected on the infected devic…
Rate this blog entry:
Continue reading
106 Hits
0 Comments

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files
This week WikiLeaks published "Vault 7" — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA).The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA's ability to hack all manner of devices.While WikiLeaks promised the "Vault 7" release is less than one percent of its 'Year Zero…
Rate this blog entry:
Continue reading
128 Hits
0 Comments

How Dutch Police Decrypted BlackBerry PGP Messages For Criminal Investigation

How Dutch Police Decrypted BlackBerry PGP Messages For Criminal Investigation
The Dutch police have managed to decrypt a number of PGP-encrypted messages sent by criminals using their custom security-focused PGP BlackBerry phones and identified several criminals in an ongoing investigation.PGP, or Pretty Good Privacy, an open source end-to-end encryption standard that can be used to cryptographically sign emails, files, documents, or entire disk partitions in order to protect them from being spied on.You'll be surprised to know how the police actually decrypted those P…
Rate this blog entry:
Continue reading
209 Hits
0 Comments