Media Coverage
Internet Security Prize
- Facebook Awards $100K for 2016 Internet Defense Prize (InfoSecurity Magazine, 8.12.16)
- Cryptographers from the Netherlands win 2016 Internet Defense Prize (CWI, 8.11.16)
Lock It and Still Lose It - on the (in) Security of Automotive Remote Keyless Entry Systems
- Millions of Volkswagens Can Be Unlocked By Hackers (IEEE Spectrum, 8.15.16)
- Security Experts Say Remotes for Cars Are Hackable (Associated Press/US News & World Report, Charlotte Observer, Miami Herlad, 8.12.16)
- A New Wireless Hack Can Unlock 100 Million Volkswagens (Wired, 8.10.16)
- Your car's keyless entry system might help hackers unlock it (Washington Post, 8.12.16)
- 'Millions' of Volkswagen cars can be unlocked via hack (BBC News, 8.12.16)
- Should drivers trust keyless security systems? (Christian Science Monitor, 8.12.16)
- Bugs in the Bug: 100 million cars, especially VW, may be at risk for unlock hacks (Extreme Tech, 8.12.16)
- Remote Door Controls Are Car Security Flaw (Scientific American, 8.12.16)
- Car Fob Hack Gets Thieves Rolling (InfoSecurity, 8.12.16)
- Millions of Volkswagens can be broken into with a wireless hack (PCWorld, 8.12.16)
- Researchers reveal flaw in Volkswagens with keyless entry (UPI.com, 8.12.16)
- 100 million vehicles are vulnerable to hack that unlocks doors (FedScoop, 8.12.16)
- Another worry for Volkswagen owners: Wireless hack can unlock millions of Audis, Porsches, VWs (Christian Science Monitor, 8.12.16)
- Key Fob Hack Allows Attackers To Unlock Millions Of Cars (Threatpost, 8.12.16)
- Study: Key Fobs of 100 Million Cars Vulnerable to Easy Hacks (Car and Driver, 8.12.16)
- Millions of cars at risk as keyless entry systems can be hacked, report says (The Guardian, 8.12.16)
- Millions of Volkswagen cars are at risk from a new security hack (Wired UK, 8.12.16)
- VW's Keyless Entry Systems Vulnerable to Hacking: European Researchers (Insurance Journal, 8.12.16)
- Wireless hack can unlock and start 100m Volkswagen vehicles (SiliconRepublic, 8.12.16)
- Volkswagen Misfortunes Continue: 100 Million Cars Since 1995 Vulnerable To Wireless Key Hack (Tech Times, 8.12.16)
- A Remote Unlocking Hack Threatens Millions of Vehicles Worldwide (Virus Guides, 8.12.16)
- 100 Million Volkswagens From 1995 Onwards Are Vulnerable To An "Unlock" Hack (AutoEvolution, 8.12.16)
- Researchers claim they can hack most Volkswagens (Consumer Affairs, 8.12.16)
- Hack of Keyless Entry Systems Put 100M VWs at Risk (eWeek, 8.12.16)
- Hackers Could Easily Break Into Your Car (US News, 8.12.16)
- Wireless hack can unlock 100 million Volkswagens (PoliticalLore.com, 8.12.16)
- Security experts find a way to hack keyless entry systems used in cars (Times of India, 8.12.16)
- A Remote Unlocking Hack Threatens Millions of Vehicles Worldwide (Virus Guides, 8.12.16)
- 100M Volkswagens Could Be Hacked Wirelessly (Nextgov, 8.12.16)
- 100 Million Volkswagens From 1995 Onwards Are Vulnerable To An "Unlock" Hack (AutoEvolution, 8.12.16)
- 100 million VWs can be unlocked with a $40 cracker (and other cars aren't much better) (Boing Boing, 8.11.16)
- Volkswagen keyless entry systems can be bypassed (IT News, 8.11.16)
- Wireless Hack Unlocks Volkswagens, Fords and Chevys (Tom's Guide, 8.11.16)
- Keyless systems of many VW Group cars can be hacked: researchers (Reuters, NBC News, 8.11.16)
- Millions of Volkswagens can be broken into with a wireless hack (PCWorld/IDG News Service, 8.11.16)
- This wireless flaw leaves millions of Volkswagens cars vulnerable (Engadget, 8.11.16)
- Researchers discover hack capable of unlocking 100M Volkswagens (New York Daily News, 8.11.16)
- 100 million Volkswagen vehicles can be unlocked wirelessly by hacker thieves (Digital Trends, 8.11.16)
- Millions of VW cars at risk: Wireless hack lets crooks clone Volkswagen keys (ZDNet, 8.11.16)
- New remote unlock hack compounds VW's problems (Digital Trends, 8.11.16)
- Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button (The Register, 8.11.16)
- Volkswagen bug: 100M vehicles vulnerable to door unlocking hack (SCMagazine, 8.11.16)
- Microsoft Already Preparing Next Windows 10 Update (eWeek, 8.15.16)
- Hackers can clone Volkswagen keys, millions of VW cars at risk (Techworm, 8.11.16)
- Millions of Keyless Volkswagen Cars are at Risk of Wireless Hacks (14U News, 8.11.16)
- Latest worry for Volkswagen owners: Wireless hack can unlock millions of Audis, Porsches, VWs (The Car Connection, 8.11.16)
- New wireless hack can unlock almost every VW made since 1995 (MyBroadband, 8.11.16)
- Millions of vehicles sold by VW over past 20 yrs are vulnerable to theft (ETAuto, 8.11.16)
- 100 Million Volkswagens Could Be Unlocked by a Simple Key Fob Hack (RoadandTrack.com, 8.11.16)
- Millions of Volkswagen cars vulnerable to a simple keyless entry hack (MarketBusinessNews, 8.11.16)
- Millions of vehicles sold by VW over past 20 yrs are vulnerable to theft (ETAuto, 8.11.16)
- More than 100 million VWs vulnerable to new wireless hack (AutoBlog, 8.11.16)
- Study: VW cars vulnerable to keyless entry hack (KVUE.com, 8.11.16)
- Old or new, your car may be ripe for hacking (boston.com, 9.4.16)
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
- Linux traffic hijack flaw also affects most Android phones, tablets (ZDNet, 8.15.16)
- Linux Has a TCP Flaw, Researchers Find (Security Intelligence, 8.15.16)
- Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks (Ars Technica, 8.10.16)
- Serious TCP Bug in Linux Systems Allows Traffic Hijacking (Threatpost, 8.10.16)
- Linux security backfires: Flaw lets hackers inject malware into downloads, disrupt Tor users, etc (The Register, 8.10.16)
- Linux operating systems vulnerable to cyber attacks (Zee News, 8.11.16)
- Internet bug lets hackers intercept your browsing to send malware (Digital Journal, 8.11.16)
- ITCP Flaw Opens Linux Systems to Hijackers (Linux Insider, 8.11.16)
- Linux Systems Vulnerable to Cyber Attacks: Report (14U News, 8.10.16)
- Use the internet? This Linux flaw could open you up to attack (Computerworld Australia, Computerworld, Network World, IT World, PCWorld New Zealand, CIO, CIO New Zeland, PCWorld, CSO, 8.11.16)
- Widespread Linux Flaw Allows TCP Session Hijacking, Termination (On the Wire, 8.10.16)
- Vulnerability found in Linux's TCP stack (ITWorld Canada, 8.11.16)
- Linux operating systems vulnerable to cyber attacks: Report (Gizbot, NDTV, Zee News, Financial Express, Avenue Mail, CanIndiaNews, IANS, Business Standard, 8.10.16)
- Linux operating systems vulnerable to cyber attacks: Study (BGR Indian, 8.11.16)
- Four in five Android devices inherit Linux snooping flaw (The Register, 8.22.16)
- 1.4 Billion Androids Open To Spying Via New TCP Flaw (Dark Reading, 8.16.16)
- 1.4 billion Android devices vulnerable to hijacking thanks to Linux TCP bug (Computerworld, 8.17.16)
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software
- Adware turns a tidy profit for those who sneak it into downloads (CIO/IDG News Service, 8.8.16)
- Pay-Per-Install Software Affects 3 Times More Users Than Malware (eWeek, 8.8.16)
- Hacking the business model of adware, scareware, other unwanted software (Science Daily, 8.6.16)
- Google Research Finds Nuisance Software Deluge (TechWeekEurope UK, 8.8.16)
- How Annoying Adware Makes Companies Money (Vocativ, 8.5.16)
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard
- Hackers Say Trucking Industry Needs to Step Up Computer Security (Trucks.com, 8.10.16)
- Can Big Trucks be Hacked? (Heavy Duty Trucking, 8.8.16)
- Hackers Hijack a Big Rig Truck's Accelerator and Brakes (Wired, 8.2.16)
- Truck hacking experiment proves pathway exists say researchers (Australiasian Transport News, 8.8.16)
- There's A Windows PC Helping Control Fleet Trucks -- Any Idiot Can Start Hacking It In 30 Seconds (Forbes, 8.6.16)
- This Software Is So Sleazy Google Calls It 'Ooze' (Fortune, 8.4.16)
- Researchers prove how disturbingly easy it can be to hack a truck or bus (Yahoo, 8.4.16)
- Michigan researchers show how easy it is to hack trucks (ITS International, 8.5.16)
- Bypassing ECU safeguards (CAN Newsletter online, 8.5.16)
- Researchers use Trojan horse to hack into software (ETCIO.com, 8.5.16)
- Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks (Wired, 7.15.16)
- US truck hacking report due for release (Australasian Transport News, 8.3.16)
- As era of autonomous trucking arrives, Michigan researchers prove how easy it is to hack trucks (Salon, 8.4.16)
Screen after Previous Screens: Spatial Temporal Recreation of Android App Displays from Memory Images
- RetroScope opens doors to the past in smart phone investigations (Purdue Newsroom, 8.2.16)
- Hidden voice commands could hijack smartphones (SC Magazine UK, 7.13.16)
- New forensic tool will recover data from smartphone RAM, encrypted or not (TechWorm, 8.13.16)
- Purdue's RetroScope 'new frontier' in smartphone forensics for law enforcement (Journal and Courier, 8.11.16)
- RetroScope opens doors to the past in smart phone investigations (Science Daily, 8.12.16)
- Forensics tool nabs data from Signal, Telegram, WhatsApp (The Register, 8.15.16)
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work
- Researchers create cryptocoin with DDoS puzzle for miners (ITNews, 8.12.16)
- New cryptocurrency DDoSCoin incentivizes users for participating in (EconoTimes, 8.15.16)
Dancing on the Lip of the Volcano: Chosen Ciphertext Attackson Apple iMessage
- iMessage's 'End-To-End' Encryption Hardly Any Better Than TLS, Say Cryptography Researchers (Tom's Hardware, 8.12.16)
- Cryptography Experts Recommend Apple Replace its iMessage (Mac Rumors, 8.14.16)
Unveil: A Large-Scale, Automated Approach to Detecting Ransomware
- Better Ransomware Detection (Bank Security News, 8.11.16)
Tracking Excavator: Uncovering Tracking in the Web's Past
- Researchers track the trackers through 20 years of the archived web (TechCrunch, 8.15.16)
Cache Attacks on Mobile Devices
- New Attacks Can Monitor Keystrokes, Steal Sensitive Data from Android Phones (On the Wire, 8.11.16)
- ARMageddon Cache Attack on Android Devices Can Monitor Keystrokes, ARM TrustZone (Softpedia News, 8.15.16)
Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos
- No, Apple's Face ID Is Not A 'Secure Password' (Forbes, 9.18.17)
- Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?) (Wired, 8.19.16)
- Hackers Can Now Unlock Phones With a VR Headset and Facebook Photos (Motherboard, 8.27.16)
- The New ‘Tracking Excavator’ Proves How Your Privacy Is Violated Online (The Fiscal Times, 8.24.16)
- Facial Recognition Can Be Tricked with Facebook Photos (Newsweek, 8.22.16)
- Your Facebook Photos Could Be Betraying Important Biometric Data (Digital Trends, 8.21.16)
- (Engadget, 8.21.16)
- VR Faces Made from Facebook Photos Fool Biometric Logins (Tom's Guide, 8.22.16)
- Here's why facial recognition tech is far from flawless (TechRadar, 8.22.16)
- Researchers crack facial security systems using 3D faces based on Facebook photos (International Business Times, 8.22.16)
- Facebook Photos Lead to Hacking of Facial Recognition System (HackRead, 8.22.16)
- Hackers Have Apparently Already Tricked Facial Recognition Technology Using Your Facebook Photos (Uproxx, 8.21.16)
- Hackers fool facial recognition system using your Facebook images (TechWorm, 8.21.16)
- Facebook photos could be used to dupe facial recognition (Biometric Update, 8.22.16) UNC researchers suggest that certain facial recognition technology can be easily traversed (French Tribune, 8.22.16)
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
- They really are watching you: web tracking surges with online ads (USA Today, 8.17.16)
- Yes, That Website You're Visiting Is Probably Tracking You (Fortune, 8.17.16)
- Computer Scientists Reveal History of Third-Party Web Tracking (Top Tech News, 9.4.16)
- The New ‘Tracking Excavator’ Proves How Your Privacy Is Violated Online (The Fiscal Times, 8.24.16)
- This New Tool Can Sniff Out Who (or What) Is Following You Online (Inc., 8.26.16)
ARMageddon: Cache Attacks on Mobile Devices
- New Attacks Can Monitor Keystrokes, Steal Sensitive Data from Android Phones (On the Wire, 8.11.16)
- ARMageddon Cache Attack on Android Devices Can Monitor Keystrokes, ARM TrustZone (Softpedia, 8.14.16)
Flip Feng Shui: Hammering a Needle in the Software Stack
- New cloud attack takes full control of virtual machines with little effort (Ars Technica, 8.31.16)
- Forget Software—Now Hackers Are Exploiting Physics (Wired, 8.31.16)
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images
- Forensics tool nabs data from Signal, Telegram, WhatsApp (The Register, 8.15.16)
- Purdue research team details new smart phone forensic data strategy (Homeland Preparedness News, 8.17.16)
connect with us