|
Academics peer inside cyber espionage net
University and industry researchers team up to track the extent of a malicious network of surveillance software, dubbed GhostNet, linked to China. 2009-03-30 Read more ... | Comment(s) | Post Comment Researchers find way to detect Conficker The fight against the widespread worm gains a significant weapon, after the Honeynet Project discovers that the program makes changes in its infected hosts detectable on the network. 2009-03-30 Read more ... | Comment(s) | Post Comment Conficker's capabilities worry researchers Security researchers' analysis of the latest variant of the widespread worm highlight the technical prowess of its programmers and the danger that comes with its expanded domain scanning. 2009-03-27 Read more ... | Comment(s) | Post Comment Security projects aim for Summer of Code For students interested in getting into security, Google's Summer of Code may be the ticket. 2009-03-26 Read more ... | Comment(s) | Post Comment No more bugs for free, researchers say Three well-known security researchers argue that flaw finders should get paid for vulnerabilities. 2009-03-24 Read more ... | Comment(s) | Post Comment Smart-grid firms need security education Researchers find serious vulnerabilities in the connected devices that will monitor and control infrastructure, frequently referred to as the "smart grid." 2009-03-24 Read more ... | Comment(s) | Post Comment Cybercriminals optimize search for cash A Web security firm finds signs that fraudsters who help attract victims to malicious Web sites are bringing in unhealthy sums of cash. 2009-03-23 Read more ... | Comment(s) | Post Comment China more friend than foe, says white hat The nation's security community is more concerned with weaknesses in its own computer networks than leveling attacks at the United States, a Chinese security researcher says. 2009-03-20 Read more ... | Comment(s) | Post Comment Researchers aim low to root hardware Two exploit writers describe ways to overwrite a computer's low-level operating instructions, allowing persistent rootkits to be created that can survive a hard-disk wipe. 2009-03-19 Read more ... | Comment(s) | Post Comment Microsoft to release exploitability tool The software giant plans to release a tool that classifies software bugs based on their crash information and estimates the security impact of the issues. 2009-03-18 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |