Tag Archives: research

Malicious PowerPoint File Targeting Flash Player Vulnerability

Trend MicroResearchers at Trend Micro have discovered a malicious PowerPoint file circulating via email, which if executed, installs a backdoor on the victim’s system. The backdoor is made possible thanks to a vulnerability in Flash Player. Continue reading Malicious PowerPoint File Targeting Flash Player Vulnerability

Slowing time as a way to counter cyberattacks

Researchers offer a new way to deal with cyberattacks on critical infrastructure like power and water utilities and banking networks: slow down Internet traffic, including the malicious code, when an attack is suspected; this would allow networks time to deal with the attacks

One of the striking special effects in the film The Matrix occurs during the scene in which Keanu Reeves’ character Neo, sways and bends to dodge bullets as time appears to slow to a crawl. Now, that scene has inspired researchers to develop a way to deal with cyberattacks on critical infrastructure, like power and water utilities and banking networks. Continue reading Slowing time as a way to counter cyberattacks

HAMR time: Seagate demos terabit-per-inch hard disk technology by Sean Gallagher

HAMR time: Seagate demos terabit-per-inch hard disk technology

An image from Seagate’s patent filing for HAMR technology, showing the pattern of storage bits on a disk surface. The bits can be heated by a laser to make them more easily written to, and are more magnetically stable when cool. Continue reading HAMR time: Seagate demos terabit-per-inch hard disk technology by Sean Gallagher

New steganography technique relies on letter shapes

A trio of Indian researchers have proposed a method of steganography which hides messages in by using non-random distribution of letters with or without straight lines.

Steganography is a group of techniques for hiding messages in plain sight. Microdots, tiny text written inside a full stop and only legible when magnified, are one steganography technique. Steganography is hard to detect and decrypt, so much so that this paper from the US National Science and Technology Council (PDF) wrings its hands about it’s potential use by terrorists. Continue reading New steganography technique relies on letter shapes