News
-
"Over 1,000 iOS Apps Found Exposing Hardcoded AWS Credentials"Mobile app developers are using insecure practices that expose Amazon Web Services (AWS) credentials, making the supply chain vulnerable. Malicious actors could use this to gain access to private databases, resulting in data breaches and the exposure of…
-
"Hackers Compete To Confound Facial Recognition"Hackers are invited to participate in a new competition aimed at exposing vulnerabilities in facial recognition technology and raising awareness of the potential risks. Since 2019, the Machine Learning (ML) Security Evasion Competition has been a staple…
-
"Rensselaer To Advance Blockchain Tech"The Algorand Foundation has awarded $363,343 to Rensselaer Polytechnic Institute's Oshani Seneviratne, director of health data research at the Institute for Data Exploration and Applications (IDEA), and Lirong Xia, associate professor of computer science…
-
"FBI Official Explains Top Challenges in Securing Mobile Tech"The FBI has identified three top challenges that the agency plans to address as it prepares to make greater use of mobile technologies. Katie Noyes, the FBI's senior strategic advisor for technology policy, discussed a variety of 5G wireless technologies…
-
"Fixing the Noise Problem in Quantum Computing"Research conducted by Xiu Yang, an assistant professor of industrial and systems engineering in Lehigh University's P.C. Rossin College of Engineering and Applied Science, could accelerate the real-world adoption of quantum computing in various fields,…
-
"Collaboration, Training Key To Local Gov Cyber Defense, Officials Say"A recent cyberattack on Fremont County, Colorado, highlighted the importance of governments being prepared for hacks in the face of ever-changing cyber threats by increasing collaboration and free training. The attack disrupted government services,…
-
"Quantum Computing Vulnerabilities of National Critical Functions"Future quantum computing capabilities will be capable of breaching the security of current public-key cryptography implementations. Public-key cryptography is the fundamental building block for the security of national information and communication…
-
"Financial Data Inexpensive for Cybercriminals to Purchase Online"The cost of compromised data and accounts can be high regarding time and money for bank victims of identity theft or account infiltration. However, the price for cybercriminals who access or sell this information could be as low as the cost of a large…
-
"TikTok for Android Bug Allows Single-Click Account Hijack"Microsoft recently discovered a high-severity flaw in the Android version of the TikTok app, which has been installed more than 1.5 billion times so far via the Google Play Store. The researchers discovered the high-severity vulnerability in the…
-
"Study Finds Security Is Lagging Behind Enterprise Adoption of SaaS"According to a new study released by the cybersecurity asset management firm Axonius Inc., Software-as-a-Service (SaaS) security is lagging behind, despite enterprise adoption of SaaS. The study, based on a survey of enterprises in the US and Europe,…
-
"Cyberbit Launches First Hyper-Realistic Cyber Security Tournament for Higher Education"Cyberbit, the world's leading cyber readiness and skills development platform provider, has announced the International Cyber League (ICL): Collegiate Cup, which will launch on October 18, 2022. The ICL: Collegiate Cup immerses students in real-world…
-
"Evil Corp and Conti Linked to Cisco Data Breach, eSentire Suggests"A new report by eSentire has connected the data breach affecting Cisco Talos systems in May with an Evil Corp-affiliate group. More specifically, eSentire's Threat Response Unit (TRU) discovered that the IT infrastructure used to attack Cisco was…