Calculating encryption schemes' theoretical security guarantees eases comparison, improvement
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone
Tomorrow at MALCON 2014, security researcher Mordechai Guri with guidance of Prof. Yuval Elovici from the cyber security labs at Ben Gurion University in Israel will present a breakthrough method ("AirHopper) ...
Experts identify easy way to improve smartphone security
What information is beaming from your mobile phone over various computer networks this very second without you being aware of it?
Microsoft beefs up security protection in Windows 10
Research shows the behaviour of business leaders could be directly linked to their experiences in childhood
What makes a great leader? Effectiveness? Experience? Volcanoes? It might seem unlikely, but new research from a team of academics, including Raghavendra Rau, Sir Evelyn de Rothschild Professor of Finance ...
76M households hit by JPMorgan data breach (Update 3)
A huge cyberattack against JPMorgan Chase & Co. this summer compromised customer information for about 76 million households and 7 million small businesses, the bank said Thursday.
New privacy battle looms after moves by Apple, Google
A new battle is brewing over privacy for mobile devices, after moves by Google and Apple to toughen the encryption of their mobile devices sparked complaints from law enforcement.
Court: UK spies get bulk access to NSA data
The British government's insistence that its spies don't use the vast espionage powers of the U.S. National Security Agency to sidestep U.K. restrictions on domestic eavesdropping was called into question by a court document ...
Georgia Tech releases 2015 Emerging Cyber Threats Report
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspac ...
US eyes cyber 'deterrence' to stop hackers (Update)
The US military is looking to flex its muscles in cyberspace as a "deterrence" to hackers eying American targets, the nation's top cyber-warrior said Tuesday.
The quick brown fox can help secure your passwords online
In 2004 Bill Gates pronounced usernames and passwords dead. Gates, a man consistently thinking ahead of the crowd, was right. Most of us – including our employers and the online services we rely on – just ...
Targeted 'malvertising' reveals move towards more sophisticated hacks
At the recent Information Security Solutions Europe conference, former White House cybersecurity adviser Howard Schmidt claimed that most security threats may be persistent, but are not as "advanced" as their co ...
New smart key software enhances security for homes and businesses
Computer scientists and security specialists have created an innovative electronic smart key system that aims to provide a safer and more flexible security system for homes and businesses.
The right to privacy in a big data world
In the digital age in which we live, monitoring, security breaches and hacks of sensitive data are all too common. It has been argued that privacy has no place in this big data environment and anything we put online can, ...