Cybersecurity

Keylogging using smartphone motion sensor

Researchers have studied keystroke inference based on side channels, such as sound, electromagnetic wave, and timing. Since these attacks exploit characteristics of physical keyboards, they become ineffective on smartphones with soft keyboards. Attacks using sensors on smartphone raises the awareness of privacy attacks on smartphone sensors. Besides the obvious privacy concern over the GPS sensor,

USB phone charging a security risk?

Many modern cellular phone use USB plug for charging and many places offer nowadays charging possibility. But plugging your phone into an untrusted USB cable is, indeed, a security risk according to Juicejacking – an emergency phone charge can be a security risk article. The article fortunately tells that it’s easy to avoid the risk

Location data collecting smart-phones

A location-based services (LBS) are a hot topic among mobile services developers. A location-based service (LBS) is an information or entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. Modern smart-phones have abilities to locate the position of the

Mag-stripe readers

iPhone mag-stripe reader stalled article tells that Square, the expected to be breakthrough business launched by twitter-founder Jack Dorsey, won’t be shipping as scheduled. Interesting is that Square was just a magnetic-stripe reader, and that there were a dozen credit card-processing applications on the iPhone. Only this time, it comes with a plastic lump that

Car electronics security

Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. Experimental Security Analysis of a Modern Automobile report experimentally evaluates these issues on a modern automobile and demonstrate the fragility of the underlying system structure. The paper demonstrates that an attacker

How trackable is your browser?

Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick service tests your browser to see how unique it is based on the information it will share with sites it visits. The service will show the information your web browser

Most Dangerous Programming Errors

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or