Related topics: security

Research predicts overlap of tunas, sharks and ships at sea

Maps that show where sharks and tunas roam in the eastern Pacific Ocean, and where fishing vessels travel in this vast expanse, could help ocean managers to identify regions of the high seas where vulnerable species may be ...

Researchers find security flaws in backscatter X-ray scanners

A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray scanners deployed ...

QR code security vulnerability found with Google Glass

Engineers at Lookout Mobile Security have discovered a previously unknown security vulnerability with Google's project Glass wearable headset. Marc Rogers reports on the company's web site that engineers found that when pictures ...

US-CERT says Wi-Fi hole open to brute force attack

(PhysOrg.com) -- The US Computer Emergency Readiness Team (US-CERT) has issued a warning about a security hole in the Wi-Fi Protected Set-up protocol for Wi-Fi routers. Security researcher Stefan Viehbock discovered the vulnerability, ...

Adobe plugs Flash webcam spy hole

(PhysOrg.com) -- Adobe engineers on Thursday fixed a vulnerability in its Flash software that could enable attackers to use a person’s computer webcam or microphone feeds for spying on the person. Adobe made changes ...

Attacking the edges of secure Internet traffic

(AP) -- Researchers have uncovered new ways that criminals can spy on Internet users even if they're using secure connections to banks, online retailers or other sensitive Web sites.

Hackers obtain email addresses of iPad 3G owners

A shadowy hacking group obtained the email addresses of over 114,000 owners of Apple iPads by exploiting a vulnerability at US telecom giant AT&T, a Silicon Valley website reported on Wednesday.

page 1 from 40