Computer security news, opinion, advice and research from anti-virus experts & New Technologies for Computer Security, Sharing the crazy for the betterment of online security

Online password guessing threat underestimated

Reusing similar passwords across many online accounts may make you more vulnerable to cyber criminals’ guessing than people realise – new research reveals. Results from research conducted by security experts in the UK and China shows, for the first time, that an overwhelming number of passwords for online accounts – used for anything from banking, social media, and shopping – are vulnerable to targeted online guessing. Targeted online guessing is when criminals guess a specific victim’s password…
Rate this blog entry:
Continue reading
103 Hits
0 Comments

Into the gray zone: New report analyzes potential of active defense as a response to sophisticated cyber threats in the private sector

A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats. The report provides a framework to develop active defense strategies and offers a set of policy recommendations to the public and private sectors to support implementation of more effective cybersecurity defenses. A key d…
Rate this blog entry:
Continue reading
123 Hits
0 Comments

New tool detects malicious websites before they cause harm

Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support their activities. Now a research team including Princeton University computer science professor Nick Feamster and recently graduated Ph.D. student Shuang Hao has developed a technique to make it more difficult to register new domains for nefarious purposes. In a paper presented at the 2016 ACM Conferenc…
Rate this blog entry:
Continue reading
152 Hits
0 Comments

Precise quantum cloning: Possible pathway to secure communication

Precise quantum cloning: Possible pathway to secure communication
Physicists at The Australian National University (ANU) and University of Queensland (UQ) have produced near-perfect clones of quantum information using a new method to surpass previous cloning limits. A global race is on to use quantum physics for ultra-secure encryption over long distances according to Prof Ping Koy Lam, node director of the ARC Centre of Excellence for Quantum Computation and Communication Technology (CQC2T) at ANU. The new cloning method uses high performance optical amplifie…
Rate this blog entry:
Continue reading
112 Hits
0 Comments

Massive cyberattack poses policy dilemma

The coordinated cyber attack that crippled parts of the internet on Friday highlighted key policy problems, a Stanford cybersecurity scholar said. And while the problems were clear, there are no easy solutions, said Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford's Center for International Security and Cooperation. A research fellow at the Hoover Institution, Lin serves on the President's Commission on Enhancing National Cybersecurity. Beginning early Friday morni…
Rate this blog entry:
Continue reading
107 Hits
0 Comments

Weakness found in common computer chip

Researchers from Binghamton University -- State University of New York and the University of California, Riverside have found a weakness in the Haswell central processing unit (CPU) components that makes common computer operating systems vulnerable to malicious attacks. Computer hackers could take control of individual, company and government computers if a weak point in address space layout randomization (ASLR) software is exploited by manipulating a CPU's branch predictor, a piece of hardware …
Rate this blog entry:
Continue reading
102 Hits
0 Comments

People can tell if they are voting on a secure system

"Rigged" election rhetoric in the headlines aims to cast doubt about the security of the American voting system; however, people have a sense of whether a voting system is secure, according to new research from Rice University. In a study of 90 voters in a mock election, researchers assessed participants' perception of the security of three voting systems, each with different levels of security: a standard paper ballot (the least secure); a paper ballot with enhanced security mechanisms (one of …
Rate this blog entry:
Continue reading
99 Hits
0 Comments

Cybersecurity needed for autos, too

Cybersecurity needed for autos, too
Most people are familiar with the process of updating the software on their computer and mobile phone, but cyber components -- and cybersecurity -- are not limited to computers and smart phones. Today's automobile is a smart device and is highly sophisticated. A modern car typically has more than 100 microprocessors, 50 electronic control units, and 100 million lines of software code. To put this sophistication in perspective, that's 50 times more lines of code than the F-22 Raptor, one of the m…
Rate this blog entry:
Continue reading
2 Hits
0 Comments

Weakness of 2G mobile phone networks revealed

A fast and relatively simple attack on second generation digital mobile phone communications highlights the need to update security on older mobile networks. The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, researches at Agency for Science, Technology and Research (A*STAR), Singapore, show. The ease of the attack shows an urgent need for the 2G Global System for Mobile Communications (GSM) enc…
Rate this blog entry:
Continue reading
98 Hits
0 Comments

First complete sabotage attack demonstrated on a 3-D printed drone propeller

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a cyber attack and malicious manipulation of blueprints can fatally damage production of a device or machine. In their paper titled "Dr0wned," researchers from Ben-Gurion University of the Negev (BGU), the University of South Alabama and Singapore University of Technology and Design detail how to sabotage the quality of a 3D-p…
Rate this blog entry:
Continue reading
101 Hits
0 Comments