News
-
"Researchers: Wi-Fi Probe Requests Expose User Data"A group of academic researchers from the University of Hamburg in Germany has recently discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests. The researchers noted that mobile devices use these…
-
"Gone in 130 Seconds: New Tesla Hack Gives Thieves Their Own Personal Key"Tesla released an upgrade last year that made it easier to start its vehicles after unlocking them with their NFC key cards. A researcher has now demonstrated how the function may be used to steal cars. For years, drivers who used their Tesla NFC key…
-
"Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign"Security researchers at Confiant have discovered that cybercriminals likely operating out of China are distributing backdoored versions of iOS and Android Web3 wallets in an effort to steal users’ seed phrase. According to the researchers, the…
-
"Businesses Are Leaving Bot Attacks Unchallenged for Almost Four Months"Netacea has published new research on how businesses are dealing with bot attacks, revealing one critical area where companies are failing to combat such attacks. According to Netacea's report, bots have been going undetected for an average of 16 weeks,…
-
"Potent Emotet Variant Spreads Via Stolen Email Credentials"Emotet's return in April appears to be the comeback for what was considered the most dangerous malware in the world, as researchers have noticed new malicious phishing campaigns involving hijacked emails to spread new variations of the malware. Deep…
-
"FIU Awarded $2 Million to Develop Artificial Intelligence Cybersecurity Tools"Researchers at Florida International University's (FIU) College of Engineering and Computing have been awarded $2 million by the US Department of Energy (DOE) in support of developing technology for preventing, detecting, analyzing, and mitigating…
-
"Hackers Depend on Trust. Don't Give It to Them: U of G Cybersecurity Researcher"As more social media users claim that their accounts have been hacked and transformed into scam accounts, a University of Guelph cybersecurity expert believes that many hackers are employing sophisticated tactics to exploit trust and carry out these…
-
"InfiRay Thermal Camera Flaws Can Allow Hackers to Tamper With Industrial Processes"Security researchers at SEC Consult have discovered that InfiRay thermal cameras are affected by vulnerabilities that could allow malicious hackers to tamper with industrial processes. InfiRay is a brand of China-based iRay Technology that…
-
"US Water Utilities Prime Cyberattack Target, Experts"The Center on Cyber and Technology Innovation (CCTI) and the Cyberspace Solarium Commission (CSC 2.0) have released policy statements based on a recent panel discussion on strengthening the cybersecurity of American water utilities. The panel included…
-
"Chinese Cyberspy Group 'Aoqin Dragon' Targeting Southeast Asia, Australia Since 2013"Security researchers at SentinelOne have analyzed the operations of a Chinese cyberespionage group that has been actively targeting education, government, and telecommunication organizations in Australia and Southeast Asia since at least 2013. The…
-
"Since 2004, the Average American Has Had at Least 7 Data Breaches"According to a recent report by IT security firm Surfshark, US citizens face the most cyber threats compared to people worldwide. Surkshark discovered that the average American had been affected by at least seven data breaches since 2004 after analyzing…
-
"Researchers Disclose Critical Flaws in Industrial Access Control System from Carrier"Carrier's LenelS2 HID Mercury access control system, which is widely used in healthcare, education, transportation, and government buildings, has been discovered to contain eight zero-day vulnerabilities. According to Trellix security researchers Steve…