Related topics: security

Mapping the effects of drought on vulnerable populations

The greater frequency of droughts, combined with underlying economic, social and environmental risks, means that dry spells have an increasingly destructive impact on vulnerable populations, and particularly on children in ...

Research predicts overlap of tunas, sharks and ships at sea

Maps that show where sharks and tunas roam in the eastern Pacific Ocean, and where fishing vessels travel in this vast expanse, could help ocean managers to identify regions of the high seas where vulnerable species may be ...

Researchers find security flaws in backscatter X-ray scanners

A team of researchers from the University of California, San Diego, the University of Michigan, and Johns Hopkins University have discovered several security vulnerabilities in full-body backscatter X-ray scanners deployed ...

QR code security vulnerability found with Google Glass

Engineers at Lookout Mobile Security have discovered a previously unknown security vulnerability with Google's project Glass wearable headset. Marc Rogers reports on the company's web site that engineers found that when pictures ...

Microsoft gets busy on fix for IE watering hole attack

(Phys.org)—Microsoft has published a security advisory about a vulnerability in Internet Explorer 6, 7, and 8. "We are only aware of a very small number of targeted attacks at this time," a Microsoft team blog said. The ...

US-CERT says Wi-Fi hole open to brute force attack

(PhysOrg.com) -- The US Computer Emergency Readiness Team (US-CERT) has issued a warning about a security hole in the Wi-Fi Protected Set-up protocol for Wi-Fi routers. Security researcher Stefan Viehbock discovered the vulnerability, ...

Adobe plugs Flash webcam spy hole

(PhysOrg.com) -- Adobe engineers on Thursday fixed a vulnerability in its Flash software that could enable attackers to use a person’s computer webcam or microphone feeds for spying on the person. Adobe made changes ...

Attacking the edges of secure Internet traffic

(AP) -- Researchers have uncovered new ways that criminals can spy on Internet users even if they're using secure connections to banks, online retailers or other sensitive Web sites.

page 1 from 39