Malware infecting hard disk firmware remained hidden for 15 years – but who's responsible?
It sometimes seems that whenever security researchers discover some new exploit or malware that allows the monitoring of remote computers, the finger is quickly pointed at the US intelligence agencies.
Anti-counterfeit polymers work like fingerprints
Powerful cyber spy tool linked to US-led effort
A powerful cyberspying tool can tap into millions of computers worldwide through secretly installed malware, security researchers say, with many signs pointing to a US-led effort.
Linux distrib vendors make patches available for GHOST
Team shows how 'spontaneous' social norms emerge
Fifteen years ago, the name "Aiden" was hardly on the radar of Americans with new babies. It ranked a lowly 324th on the Social Security Administration's list of popular baby names. But less than a decade ...
Eyeglasses that turn into sunglasses—at your command
Imagine eyeglasses that can go quickly from clear to shaded and back again when you want them to, rather than passively in response to changes in light. Scientists report a major step toward that goal, which ...
Companies increasingly turn to tech to keep drones out of no-fly zones
Low-cost hobby drones are making the power of flight accessible to anyone with a few hundred bucks to spare. But a combination of technology and safety laws could take the controls out of users' hands.
Swiss bank on safe haven label to become world's data vault
Switzerland, facing an erosion of the banking secrecy laws that helped make it the world's banker, is now touting its reputation as a safe and stable haven to become a global data vault.
Did NSA plant spyware in computers around world? (Update)
Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world?
Giant US health-data breach could lead to China
Data on as many as 80 million customers at US health insurance giant Anthem was stolen by hackers, officials confirmed Thursday, in a cyberattack investigators have reportedly linked to China.
Stolen SIM card keys could be powerful spy tool (Update)
It would be another powerful tool in the arsenal of US and British spy services: encryption keys for a large share of the SIM cards used for mobile phones.
Buffer overflows are the ghosts that will always be among us
Following the trend of giving catchy names to serious operating system security flaws, the Linux vulnerability revealed recently by security researchers Qualys has been called Ghost. ...
Combined cyber and physical security system for charging electric vehicles
As electricity grids become more sophisticated, grid administrators can collect instantaneous data on consumer and supplier behavior. The 'smart grid' then learns to improve the reliability, costs and sustainability of electricity ...
Cybersecurity issue goes beyond the Anthem headlines
While the security breach affecting as many as 80 million Anthem Inc. customers generates big headlines because of its size, it's the smaller-scale attacks that concern Purdue University cybersecurity expert Eugene Spafford.