Cybersecurity

Visa shows off data centre security

Credit card company Visa has boasted that one of its US data centres possesses the ultimate security features. Many details of the site are reported by USA Today and Fast Company, which both seem to have been invited to the facility, the company’s Operations Centre East (OCE). Also The Register and ABC news have written

Credit card (in)security issues

Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The fraud begins with either the theft of the physical card or the compromise of data associated with the account (card account number and/or verification

SCADA systems security issues

SCADA systems are used to monitor and control critical installations in oil and gas refineries, water and power distribution plants, manufacturing plants and other industrial facilities. There has been a lot of discussion about malware and security in industrial automation systems after Stuxnet. Widely viewed as the most complex piece of computer malware ever created,

Phone spying busted

BUSTED! Secret app on millions of phones logs key taps article tells that Android app developer Trevor Eckhart has published what he says is conclusive proof that millions of smartphones are secretly monitoring the key presses, geographic locations, and received messages of its users. Many Android, Nokia, and BlackBerry smartphones have software called Carrier IQ.

Captcha security

Outsmarted: Captcha security not much of a gotcha article tells that a team of Stanford University researchers has bad news to report about Captchas, those often unreadable, always annoying distorted letters that you’re required to type in at many a Web site to prove that you’re really a human. Captcha is often used to defend

Surveillance system to monitor mobile phones

Met police using surveillance system to monitor mobile phones article from theguardian magazine article tells that civil liberties group raises concerns over The Metropolitan police purchase of technology to track public handsets over a targeted area. Britain’s largest police force is operating covert surveillance technology that can masquerade as a mobile phone network. This allow

Keylogging using smartphone motion sensor

Researchers have studied keystroke inference based on side channels, such as sound, electromagnetic wave, and timing. Since these attacks exploit characteristics of physical keyboards, they become ineffective on smartphones with soft keyboards. Attacks using sensors on smartphone raises the awareness of privacy attacks on smartphone sensors. Besides the obvious privacy concern over the GPS sensor,