News
  • "'Hundreds' Of Websites Track User Keystrokes"

    A study conducted by Princeton University alleges the use of session replay scripts by more than 480 websites to record each visitor’s keystrokes, which would then be sent to third-party servers. In addition to keystrokes, these session replay scripts…

  • "How Quantum Computing Could Create Unbreakable Encryption and Save the Future of Cybersecurity"

    In the latest issue of Science Advances, researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory, have announced a new breakthrough in quantum computing in which they have significantly increased the speed of quantum…

  • "Mobile Malware a Universal Threat Around the Globe: Check Point"

    Findings shared within the recent Check Point Mobile Threat Research Report reveals that no company is completely safe from mobile malware as an overwhelming majority of the 850 organizations worldwide have faced at least one mobile attack in the last…

  • "Creating ATM Botnets Not Difficult, Researchers Say"

    According to Kaspersky Lab researchers, Olga Kochetova and Alexey Osipov, automated teller machines (ATMs) often run outdated and flawed software, which significantly increases their vulnerability to cyber and physical attacks. The vulnerability of these…

  • “Windows 10 Security Feature Broken, CERT/CC Warns”

    CERT/CC has recently revealed a flaw in the Windows operating system, affecting users of Windows 8, 8.1, and 10. The flaw is based in a feature known as ASLR (address space layout randomization), which helps prevent attacks such as code-reuse and return-…

  • "Worried About Hackers, States Turn to Cyber Insurance"

    As the severity of cyberattacks continues to grow, states are increasingly making use of cyber insurance for protection. Cyber insurance policies are meant to cover the massive losses and expenses faced by states in the event that their computer networks…

  • "Intel Chip Flaws Leave Millions of Devices Exposed"

    Critical flaws have been discovered within the Intel Management Engine (ME), Intel Trusted Execution Engine (TXE), and Server Platform Services (SPS). The ME is a subsystem that runs independently within the Intel chipset, which enables management…

  • "NHS Needs to Develop Cyber-Sec Culture to Reap Benefits of Digitisation"

    The results of a survey conducted by Palo Alto in collaboration with Vanson Bourne, have revealed the beliefs of National Health Service (NHS) IT managers in regards to cybersecurity in the NHS. The survey touched upon subjects of data security,…

  • “Four Methods Hackers Use to Steal Data from Air-Gapped Computers”

    Security researchers have demonstrated ways in which data could be extracted from air-gapped computer systems through the development of covert channels. These channels are characterized into 4 different types, which include electromagnetic, acoustic,…

  • "Chemist Proposes 'Sweaty Analysis' to Better Secure Electronics"

    Jan Halámek, an assistant chemistry professor at the University at Albany, has released a new concept paper in which he focuses on cybersecurity and the use of sweat analysis as a new method of biometric authentication. The proposed approach for…

  • "Bugcrowd: Young Cybersecurity Professionals Are Turning to Bug Hunting"

    An annual report released by Bugcrowd titled, “Inside the Mind of a Hacker 2.0”, shares findings in relation to the bug hunting community. The report reveals that there has been a considerable increase of participants in bug bounty programs from 2016.…

  • "Hacking Blockchain with Smart Contracts to Control a Botnet"

    Security researcher, Majid Malaika, has warned of the possible abuse of Blockchain technology to enable the creation of a powerful new form of botnet. The attack method that has been named “Botract”, abuses code that runs on a blockchain known as a smart…