News Briefs (Page 14 of 105)   < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >
Academics peer inside cyber espionage net
University and industry researchers team up to track the extent of a malicious network of surveillance software, dubbed GhostNet, linked to China.
By: Robert Lemos 2009-03-30
Read more ...  |  Comment(s)  |  Post Comment

Researchers find way to detect Conficker
The fight against the widespread worm gains a significant weapon, after the Honeynet Project discovers that the program makes changes in its infected hosts detectable on the network.
By: Robert Lemos 2009-03-30
Read more ...  |  Comment(s)  |  Post Comment

Conficker's capabilities worry researchers
Security researchers' analysis of the latest variant of the widespread worm highlight the technical prowess of its programmers and the danger that comes with its expanded domain scanning.
By: Robert Lemos 2009-03-27
Read more ...  |  Comment(s)  |  Post Comment

Security projects aim for Summer of Code
For students interested in getting into security, Google's Summer of Code may be the ticket.
By: Robert Lemos 2009-03-26
Read more ...  |  Comment(s)  |  Post Comment

No more bugs for free, researchers say
Three well-known security researchers argue that flaw finders should get paid for vulnerabilities.
By: Robert Lemos 2009-03-24
Read more ...  |  Comment(s)  |  Post Comment

Smart-grid firms need security education
Researchers find serious vulnerabilities in the connected devices that will monitor and control infrastructure, frequently referred to as the "smart grid."
By: Robert Lemos 2009-03-24
Read more ...  |  Comment(s)  |  Post Comment

Cybercriminals optimize search for cash
A Web security firm finds signs that fraudsters who help attract victims to malicious Web sites are bringing in unhealthy sums of cash.
By: Robert Lemos 2009-03-23
Read more ...  |  Comment(s)  |  Post Comment

China more friend than foe, says white hat
The nation's security community is more concerned with weaknesses in its own computer networks than leveling attacks at the United States, a Chinese security researcher says.
By: Robert Lemos 2009-03-20
Read more ...  |  Comment(s)  |  Post Comment

Researchers aim low to root hardware
Two exploit writers describe ways to overwrite a computer's low-level operating instructions, allowing persistent rootkits to be created that can survive a hard-disk wipe.
By: Robert Lemos 2009-03-19
Read more ...  |  Comment(s)  |  Post Comment

Microsoft to release exploitability tool
The software giant plans to release a tool that classifies software bugs based on their crash information and estimates the security impact of the issues.
By: Robert Lemos 2009-03-18
Read more ...  |  Comment(s)  |  Post Comment

News Briefs (Page 14 of 105)   < Prev  9 10 11 12 13 14 15 16 17 18 19  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus