Tag Archive for: Researchers

The Neutrino exploit kit has a new way to detect security researchers – CSO Online


CSO Online

The Neutrino exploit kit has a new way to detect security researchers
CSO Online
The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks. The feature was discovered after Trustwave's SpiderLabs division found computers they were using for research

and more »

“exploit kit” – read more

Android Security Researchers Were Paid $200000 Last Year – Android Headlines – Android News


ZDNet

Android Security Researchers Were Paid $ 200000 Last Year
Android Headlines – Android News
Back in 2010, Google started up their Vulnerability Rewards Program. This program provided rewards for researchers who happened to find any vulnerabilities in Google's apps and services. In 2015, Google added Android itself to the equation, as well as …
Android bugs made up 10 percent of Google's $ 2m bounty payouts – in just five monthsZDNet

all 6 news articles »

“android security” – read more

Cybersecurity Researchers Are Hunted from All Sides – Motherboard

Cybersecurity Researchers Are Hunted from All Sides
Motherboard
His team was actively involved in analyzing Flame, a cyber weapon from the same family as Stuxnet, also aimed at attacking Middle Eastern countries, especially Iran. This sophisticated malware was, again, allegedly developed by the US and Israel, the …

and more »

flame malware – read more

Crypto researchers: Time to use something better than 1024-bit encryption

It’s actually possible for entities with vast computing resources – such as the NSA and major national governments – to compromise commonly used Diffie-Hellman key exchange groups, so it’s time for businesses to switch to something else like elliptic curve cryptography, researchers say.

“It’s been recommended to move from 1024-bit [encryption] for a long time, and now there are very concrete risks of not doing that,” says Nadia Heninger, an assistant professor of computer and information science at the University of Pennsylvania who is an author of a paper titled “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice”.

To read this article in full or to leave a comment, please click here

Network World Security