News
  • "This Quantum Random Number Generator Can Never Be Hacked"
    A new quantum method developed by NIST addresses the challenge of generating true random numbers for the process of encryption. The method generates truly random strings of numbers through the use of entangled photons. This article continues to discuss…
  • "False Software Update Leads Users to Get Bitten by Malware Infection"
    Security researchers have recently found a campaign to distribute malware via false updates for applications such as Chrome, Firefox, and Adobe Flash. The malware takes advantage of the legitimate remote access tool NetSupport Manager to gain access…
  • "Emergency Alert Systems Used Across the US Can Be Easily Hijacked"
    Bastille researchers have discovered that emergency alert systems supplied by ATI systems are vulnerable to an attack in which warning sirens are activated and alarms are falsely triggered. The vulnerability emerges because the radio protocol used to…
  • "As Legal Threats Rise, This New Report Aims to Guide Ethical Hackers"
    A report conducted by the Center for Democracy and Technology aims to help security researchers, ethical hackers, and bug hunters determine the risks associated with their security research activities that they may face. The report addresses the issue of…
  • "Fraudsters Using HTTP Injectors to Steal Internet Access"
    Analysts at Flashpoint have warned of the use of HTTP injectors to obtain unauthorized internet access. The technique that is being used by fraudsters in Latin America, modifies HTTP headers with injector files in order to gain free unauthorized access…
  • "100% of Web Apps Contain Vulnerabilities"
    A report conducted by Trustwave reveals that 100% of web applications contain at least one vulnerability. According to the report, a majority of security weaknesses discovered to be contained by web applications are associated with session management.…
  • "Warning over State-Backed Exploiting Security Flaws in Cisco Switches"
    Cisco Talos have revealed that nation-state hackers have been exploiting security vulnerabilities contained by Cisco network switches in order to launch cyberattacks on critical infrastructure. According to researchers, attackers have been abusing a…
  • "Crypto Crumpling Could Solve the Encryption Conundrum"
    Researchers from Boston University and Portland State University have developed a method called cryptographic crumpling, which addresses the conflict between the federal government and technology firms about encryption. The method of cryptographic…
  • "Cyberinsurance Tackles the Wildly Unpredictable World of Hacks"
    The cyberinsurance market continues to grow as companies become more concerned about emerging cyberthreats. However, cyberinsurance carriers still face challenges surrounding the modeling of risks and predicting of outcomes due to the ever-changing…
  • "Diminutive Robot Defends Factories Against Cyberthreats"
    HoneyBot is a small robot that is designed to protect factories and other industrial facilities from hackers. Researchers at the Georgia Institute of Technology designed the robot to mislead hackers into revealing information upon gaining access to the…
  • "Georgia Just Passed a Broad Cybercrime Bill That Has Researchers Worried"
    SB 315 is a cybercrime bill that has been passed by the Georgia legislature. This bill is raising serious concerns among security researchers within the state of Georgia. It poses a threat to academic and independent security researchers as it aims to…
  • "Cyberattack Targets Energy Industry Pipeline Data"
    Energy Transfer Partners, a Dallas-based pipeline company, was recently hit by a cyberattack. Cybercriminals hacked the pipeline network’s electronic data interchange system, which is used to facilitate oil and gas transactions. This article continues to…