Researchers at Trend Micro have discovered a malicious PowerPoint file circulating via email, which if executed, installs a backdoor on the victim’s system. The backdoor is made possible thanks to a vulnerability in Flash Player. Continue reading Malicious PowerPoint File Targeting Flash Player Vulnerability
Researchers offer a new way to deal with cyberattacks on critical infrastructure like power and water utilities and banking networks: slow down Internet traffic, including the malicious code, when an attack is suspected; this would allow networks time to deal with the attacks
One of the striking special effects in the film The Matrix occurs during the scene in which Keanu Reeves’ character Neo, sways and bends to dodge bullets as time appears to slow to a crawl. Now, that scene has inspired researchers to develop a way to deal with cyberattacks on critical infrastructure, like power and water utilities and banking networks. Continue reading Slowing time as a way to counter cyberattacks
A trio of Indian researchers have proposed a method of steganography which hides messages in by using non-random distribution of letters with or without straight lines.
Steganography is a group of techniques for hiding messages in plain sight. Microdots, tiny text written inside a full stop and only legible when magnified, are one steganography technique. Steganography is hard to detect and decrypt, so much so that this paper from the US National Science and Technology Council (PDF) wrings its hands about it’s potential use by terrorists. Continue reading New steganography technique relies on letter shapes