Search results for: Trojan

How beetles hack into ant colonies

Pretending to be one of them, ant-nest beetles trick ants to rear their brood—and then reward their hosts by devouring them. UA entomologists have discovered that the beetles evolve at an astonishing rate.

Nov 03, 2014
4.8 / 5 (4) 0

In cybersecurity, the weakest link is you

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually ...

Nov 03, 2014
4.5 / 5 (2) 0

When the ATM runs Windows, how safe is your money?

How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked South Korea offl ...

Oct 13, 2014
4.5 / 5 (2) 1

iWorm hack shows Macs are vulnerable too

The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws in that code – and there will ...

Oct 08, 2014
5 / 5 (2) 2