Skip to main content

Home/ Brian links/ Group items tagged exploits

Rss Feed Group items tagged

Kevin DiVico

Cybercriminals using digitally signed Java exploits to trick users | Security - InfoWorld - 0 views

  •  
    "Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers. A signed Java exploit was discovered Monday on a website belonging to the Chemnitz University of Technology in Germany that was infected with a Web exploit toolkit called g01pack, security researcher Eric Romang said Tuesday in a blog post. "
Kevin DiVico

Best of 2012: PlaceRaider: The Military Smartphone Malware Designed to Steal Your Life ... - 0 views

  •  
    "The power of modern smartphones is one of the technological wonders of our age. These devices carry a suite of sensors capable of monitoring the environment in detail, powerful data processors and the ability to transmit and receive information at high rates.  So it's no surprise that smartphones are increasingly targeted by malware designed to exploit this newfound power. Examples include software that listens for spoken credit card numbers or uses the on-board accelerometers to monitor credit card details entered as keystrokes.
Kevin DiVico

Android apps used by millions vulnerable to password, e-mail theft | Ars Technica - 0 views

  •  
    Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found. The researchers identified 41 applications in Google's Play Market that leaked sensitive data as it traveled between handsets running the Ice Cream Sandwich version of Android and webservers for banks and other online services. By connecting the devices to a local area network that used a variety of well-known exploits, some of them available online, the scientists were able to defeat the secure sockets layer and transport layer security protocols implemented by the apps. Their research paper didn't identify the programs, except to say they have been downloaded from 39.5 million and 185 million times, based on Google statistics.
Kevin DiVico

I.B.M.: Big Data, Bigger Patterns - NYTimes.com - 0 views

  •  
    It's not just about Big Data. For the big players in enterprise technology algorithms, it's about finding big patterns beyond the data itself. The explosion of online life and cheap computer hardware have made it possible to store immense amounts of unstructured information, like e-mails or Internet clickstreams, then search the stored information to find some trend that can be exploited. The real trick is to do this cost-effectively. Companies doing this at a large scale look for similarities between one field and another, hoping for a common means of analysis.
Kevin DiVico

Experimental Philosopher to Clone Obama, Lady Gaga, and Other Celebrities | Think Tank ... - 0 views

  •  
    What if you could replicate President Obama's famous cool, Lady Gaga's style and Michael Phelps's athleticism? An experimental philosopher is attempting to do just that. Sort of.  Jonathan Keats, a "poet of ideas" whose exploits include opening a photosynthetic restaurant for plants and a celestial observatory for cyanobacteria, is now introducing "the first trouble-free human cloning technique." 
1 - 5 of 5
Showing 20 items per page