2014 Oct security-low

Stealing personal information from mobile apps

A group of researchers from University of California Riverside Bourns College of Engineering and the University of Michigan claim they can hack Gmail with a success rate of up to 92 percent. You would think that apps on your smartphone are siloed from each other. Their attack exploits a weakness in mobile OS like Android, […]

  Read more
2014 May

Bringing experimental brain computing to the masses

Although some products already exist, brain computer interfaces are still in their early stages of development.  Until now research and experimental development has been mainly confined in well equipped laboratories in universities and technology companies.  Launched by the team behind the OpenBCI project, large-scale manufacture of a low-cost electroencephalography (EEG)-reading headset device, , could help […]

  Read more
2013 Dec

Computer noise is key to decryption

Due to changes in power usage when performing different operations, your computer generates a varying high-pitched tone, which when properly detected and decoded can be correlated with the compute activity.  Noticing that RSA decryption operations induce different sound patterns, University of Tel Aviv researchers have shown that it is possible to recover 4096-bit secret keys […]

  Read more
2013 Nov

Breaking the image size barrier in Wikipedia

Processing high volume of large images consumes a lot of resources. For many years Wikipedia had responded to the problem of large image files with a ban. With the advent of VipsScaler, a Wikipedia Mediawiki extension based on the fast, free VIPS image processing system, more and larger images can be hosted on Wikipedia. Whereas […]

  Read more