Cybersecurity

Credit card (in)security issues

Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The fraud begins with either the theft of the physical card or the compromise of data associated with the account (card account number and/or verification

How I'm Being Followed on Web

I’m Being Followed: How Google—and 104 Other Companies—Are Tracking Me on the Web is a voyage into the invisible business that funds the web. Who are these companies and what do they want from me? Even if you’re generally familiar with the idea of data collection for targeted advertising, the number and variety of these

Security trends for 2012

Here is my collection of security trends for 2012 from different sources: Windows XP will be the biggest security threat in 2012 according to Sean Sullivan, security advisor at F-Secure: “People seem to be adding new systems without necessarily abandoning their old XP machines, which is great news for online criminals, as XP continues to

SCADA systems security issues

SCADA systems are used to monitor and control critical installations in oil and gas refineries, water and power distribution plants, manufacturing plants and other industrial facilities. There has been a lot of discussion about malware and security in industrial automation systems after Stuxnet. Widely viewed as the most complex piece of computer malware ever created,

Phone spying busted

BUSTED! Secret app on millions of phones logs key taps article tells that Android app developer Trevor Eckhart has published what he says is conclusive proof that millions of smartphones are secretly monitoring the key presses, geographic locations, and received messages of its users. Many Android, Nokia, and BlackBerry smartphones have software called Carrier IQ.

Captcha security

Outsmarted: Captcha security not much of a gotcha article tells that a team of Stanford University researchers has bad news to report about Captchas, those often unreadable, always annoying distorted letters that you’re required to type in at many a Web site to prove that you’re really a human. Captcha is often used to defend

Surveillance system to monitor mobile phones

Met police using surveillance system to monitor mobile phones article from theguardian magazine article tells that civil liberties group raises concerns over The Metropolitan police purchase of technology to track public handsets over a targeted area. Britain’s largest police force is operating covert surveillance technology that can masquerade as a mobile phone network. This allow

Keylogging using smartphone motion sensor

Researchers have studied keystroke inference based on side channels, such as sound, electromagnetic wave, and timing. Since these attacks exploit characteristics of physical keyboards, they become ineffective on smartphones with soft keyboards. Attacks using sensors on smartphone raises the awareness of privacy attacks on smartphone sensors. Besides the obvious privacy concern over the GPS sensor,

USB phone charging a security risk?

Many modern cellular phone use USB plug for charging and many places offer nowadays charging possibility. But plugging your phone into an untrusted USB cable is, indeed, a security risk according to Juicejacking – an emergency phone charge can be a security risk article. The article fortunately tells that it’s easy to avoid the risk

Why isn't the Web using it HTTPS always?

You wouldn’t write your username and passwords on a postcard and mail it for the world to see, so why are you doing it online? Every time you log in to any service that uses a plain HTTP connection that’s essentially what you’re doing. There is a better way, the secure version of HTTP—HTTPS. HTTPS