News
-
"QakBot Returns, Locking Out Active Directory Accounts"QakBot malware, which surfaced in 2009, has returned and is now behind the lockouts of Microsoft Active Directory accounts. The Active Directory is a centralized system, which allows administrators to control networks as well as manage the authentication…
-
"Fireball – The Chinese Malware of 250 Million Computers Infected"Malware by the name of “Fireball” has recently been discovered by Check Point Threat Intelligence and research teams, which has infected over 250 million computers globally. The malware infiltrates and manipulates users’ browsers and web-traffic to…
-
"International data privacy laws create inconsistent rules"China’s new data privacy law went into effect on June 1, 2017. While this new regulation primarily rules over network operators and critical information infrastructure (CII), there is much concern pertaining to the extensive impact it may have on…
-
"Cybersecurity Experts Anticipate Growing Number of Attacks Against ERP Systems"A survey conducted by Crowd Research Partners with the help of ERPScan, reveals the lack of awareness and implementation of security measures within enterprises, though most cybersecurity professionals surveyed agree that the number of cyberattacks…
-
"Bolstering the security of inter-domain routing"The Border Gateway Protocol (BGP), which is the default routing protocol for directing traffic between organizations such as ISPs and Autonomous Systems, will be undergoing improvements to secure the inter-domain routing traffic exchange. The NIST is…
-
"App uses smartphone compass to prevent voice hacking"Voice-based smartphone apps can pose serious security threats to users via voice hacking. Attackers could use audio samples of users’ voices for impersonation to deceive people and digital security systems in order to retrieve sensitive information.…
-
"Cybercriminals Regularly Battle it Out on the Dark Web"A recent study conducted by researchers at Trend Micro reveals that cybercriminals within the Dark Web are not only attacking those outside of it, but also those who participate in it. This discovery was made when the security vendor constructed four…
-
"Cloak-and-Dagger Attack Creates Android Device Takeover Risk"Researchers at Georgia Tech have recently discovered a new attack by the name of “Cloak and Dagger”, which can allow cyberattackers to take full control over an Android device to perform further malicious activity. According to researchers, this attack…
-
"Tainted Leaks: Researchers Unravel Cyber-Espionage Attacks"According to privacy researchers at the University of Toronto’s Citizen Lab, a cyber espionage campaign allegedly connected to Russia, has launched phishing attacks by distributing false emails that appear to be from Google. This attack has targeted more…
-
"8,000 Vulnerabilities Found in Pacemakers"White Scope, a security research firm, have discovered vulnerabilities within pacemakers. The examination of seven different pacemaker programmers, which are produced by four different manufacturers, reveal a shocking 8,000 vulnerabilities risen by…
-
"Ensuring the security of digital information"The task of protecting large bytes of sensitive digital data that is created, stored, transferred, and exchanged, is quite massive for computer technicians and researchers. The possibility of breaching security is immense as well as the…
-
“Two exciting breakthroughs in autonomous vehicle cybersecurity, though questions remain”As vehicles become more autonomous and intelligent through the advancement of computerized systems and sensors to provide safer mobility, the potential infiltration of such technology will always be present. Researchers at the University of Virginia and…