New mobile exploits demonstrated at Pwn2Own event

Wednesday, November 13th, 2013

At information security conference PacSec 2013 in Tokyo, two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP. Japanese squad Team MBSD, of Mitsui Bussan Secure Directions, Inc., collected $40,000 for installing malware and collecting personal data on the Android-powered Samsung Galaxy S4. The group ...

Researcher Uncovers Backdoor Vulnerability in D-Link Routers

Monday, October 14th, 2013

A security researcher this weekend discovered a backdoor vulnerability with certain D-Link routers that might allow cyber criminals to alter a router's setting without a username or password. In a note on its website, D-Link said it is "proactively working with the sources of these reports as well as continuing to review ...

Security researchers create undetectable hardware trojans

Tuesday, September 17th, 2013

A team of security researchers from the U.S. and Europe has released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level. As proof of the effectiveness of the approach, ...

Researchers show how to slip malware into Apple’s App Store

Saturday, August 17th, 2013

Apple’s App Store can seem like Fort Knox, with Apple reviewing each and every app before making it live. This fastidious approach works, for the most part, but it isn’t a perfect process. MIT Technology Review reports that researchers from Georgia Tech recently managed to get a malware-infected app approved by Apple ...

The FBI uses the microphone and camera on phones to spy on people

Saturday, August 3rd, 2013

Do you carry your cell phone with you wherever you go? Of course you do. Indeed, a study even showed that 75% of people actually use their phone while in the bathroom! So is it any surprise that the best way to get information on suspected criminals would be to snoop ...