The Latest in IT Security

Posts Tagged ‘Researchers’

White hat researchers show how hackers read keystrokes to potentially compromise cellphone and tablet users on public Wi-Fi and home networks. A group of seven computer scientists have discovered WindTalker, a vulnerability in Wi-Fi networks that lets hackers potentially read keystrokes based on the finger position of a cellphone or tablet user. Read More

Read more ...

Italian security researchers have discovered a vulnerability that can be easily exploited to break into messaging applications such as Telegram, WhatsApp, and Signal. According to InTheCyber security researchers, the rather old voicemail caller-ID spoofing flaw can be leveraged to steal activation codes sent by messaging apps and compromise accounts. The researchers say that networks of […]

Read more ...

Researchers have found a design flaw in the branch predictor, a component of Intel’s Haswell processor, and have exploited it to bypass ASLR (Address Space Layout Randomization). ASLR is a defense mechanism present in major operating systems and many applications, and protects systems from common attacks such as buffer overflow and return-oriented programming attacks. Read […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments