searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

research

Get our top stories in your inbox

Researchers devise RAMBleed attack to grab secret data from memory

June 12, 2019

Researchers have demonstrated a new variation of the Rowhammer attack: dubbed RAMBleed, it may allow attackers to read data stored inside the computer’s physical memory. …

First framework to score the agility of cyber attackers and defenders

June 12, 2019

To help train government and industry organizations on how to prevent cyberattacks, as part of a research project for the U.S. Army, scientists at The University of Texas at …

Hackproofing smart meters and boosting smart grid security

June 11, 2019

Smart electricity meters are useful because they allow energy utilities to efficiently track energy use and allocate energy production. But because they’re connected to …

New user keystroke impersonation attack uses AI to evade detection

June 10, 2019

A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …

Two-thirds of iOS apps don’t use App Transport Security

June 7, 2019

Most iOS apps don’t take advantage of App Transport Security​ (ATS), a networking security feature offered by Apple that ensures encrypted connections between apps and …

Hack The Sea: Bridging the gap between hackers and the maritime sector

June 4, 2019

There’s a not a lot of researchers probing the security of computer systems underpinning the maritime industry. The limitations that keep that number low are obvious: …

Researchers fight ransomware attacks by leveraging properties of flash-based storage

May 31, 2019

Ransomware continues to pose a serious threat to organizations of all sizes. In a new paper, “Project Almanac: A Time-Traveling Solid State Drive,” University of …

Researchers spot manipulated photos and video using AI-driven imaging system

May 31, 2019

To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate …

How mainstream media coverage affects vulnerability management

May 24, 2019

For better or for worse, mainstream media is increasingly covering particularly dangerous, widespread or otherwise notable security vulnerabilities. The growing coverage has …

Researchers develop cybersecurity system to test for vulnerabilities in technologies that use GPS

May 1, 2019

Southwest Research Institute has developed a cybersecurity system to test for vulnerabilities in automated vehicles and other technologies that use GPS receivers for …

Researchers develop new technique to identify malware in embedded systems

April 29, 2019

A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina …

Research on private key generation reveals theft of ETH funds from accounts with discoverable keys

April 24, 2019

Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE …

Posts navigation

1 … 14 15 16 17 18 19 20 21 22 … 38

Featured news

  • These 15 European startups are set to take the cybersecurity world by storm
  • Enhance security while lowering IT overhead in times of recession
  • Why you should treat ChatGPT like any other vendor service
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

These 15 European startups are set to take the cybersecurity world by storm

Enhance security while lowering IT overhead in times of recession

Why you should treat ChatGPT like any other vendor service

2022 witnessed a drop in exploited zero-days

5 rules to make security user-friendly

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us