News
-
"The Real Risks in Google's New .Zip and .Mov Domains"Google released eight new Top-Level Domains (TLDs) at the beginning of May. These are the suffixes at the end of URLs, such as ".com" or ".uk." The new TLDs include ".zip" and ".mov," which are expected to invite phishing and other forms of online fraud…
-
"Backup Repositories Targeted in 93% of Ransomware Attacks"Security researchers at Veeam discovered that 85% of organizations have suffered at least one ransomware attack over the past 12 months. The researchers warned that if this trend continues, "more organizations will suffer a ransomware attack than…
-
"Team Develops New 'Attacker' Device to Improve Autonomous Car Safety"Today's cars and autonomous vehicles use millimeter wave (mmWave) radio frequencies to facilitate self-driving or assisted driving functions that protect passengers and pedestrians. However, this connectivity can also leave them vulnerable to…
-
Cyber Scene #80 - Digitization: Making Money Makes the World Go RoundCyber Scene #80 - Digitization: Making Money Makes the World Go Round
-
SoS Musings #73 - Insider Threats Are Still on the RiseSoS Musings #73 - Insider Threats Are Still on the Rise
-
Cybersecurity Snapshots #42 - New Ransomware Gang Discovered: The RA GroupCybersecurity Snapshots #42 - New Ransomware Gang Discovered: The RA Group
-
"Apps for Older Adults Contain Security Vulnerabilities"Technology and mobile devices are most commonly associated with younger users, but older individuals are not far behind. Pew Research Center estimates that approximately 61 percent of older people in the US own a smartphone. This market is expected to…
-
"Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own"Latvian network equipment manufacturer MikroTik has recently released a patch for a major security defect in its RouterOS product and confirmed the vulnerability was exploited five months ago at the Pwn2Own Toronto hacking contest. The flaw, CVE-…
-
"UCLA Computer Grad Constructs 'Crown Jewel of Cryptography'"Aayush Jain received the 2022 ACM Doctoral Dissertation Award for his dissertation entitled "Indistinguishability Obfuscation From Well-Studied Assumptions." From well-studied hardness conjectures, Jain's dissertation established the feasibility of…
-
"Could These Bills Endanger Encrypted Messaging?"Billions of people worldwide use end-to-end encrypted messaging apps such as WhatsApp, Telegram, and Signal. In theory, end-to-end encryption ensures that only the sender and recipient possess the keys necessary to decrypt their message. Not even an app'…
-
"Legion Malware Upgraded to Target SSH Servers and AWS Credentials"An updated version of the commodity malware known as Legion includes enhanced capabilities to compromise SSH servers and Amazon Web Services (AWS) credentials linked to DynamoDB and CloudWatch. Cado Labs researcher Matt Muir said the recent update…
-
"GoldenJackal State Hackers Silently Attacking Govts Since 2019"Since 2019, a relatively unknown Advanced Persistent Threat (APT) group called GoldenJackal has been conducting espionage against government and diplomatic entities in Asia. The threat actors have maintained a low profile for hiding, carefully selecting…