News
  • "5G Networks Present New Risks and Security Challenges"
    The 5G mobile communication standard will bring improvements regarding speed, latency, and network capacity. However, as with any other new technology, 5G networks are expected to be abused by threat actors. The potential security vulnerabilities…
  • "Google Removes 500+ Malicious Chrome Extensions From the Web Store"
    More than 500 malicious Chrome extensions were recently removed from Google's Web Store. An investigation conducted by security researcher Jamila Kaya and Cisco's Duo security found that the extensions injected malicious ads (malvertising) in millions of…
  • "Plastic Surgery Patient Photos, Info Exposed by Leaky Database"
    Due to the improper security of an Amazon Web Services (AWS) S3 bucket, approximately 900,000 documents were leaked from NextMotion, a France-based technology company that provides imaging and patient management services for 170 plastic surgery clinics…
  • "Researchers Design a Tool to Identify the Source of Errors Caused by Software Updates"
    Software updates intend to make applications run faster or more smoothly, however, sometimes software updates can have bugs known as performance regressions, which can make the software run slower or less smoothly. Usually, it takes a lot of time to fix…
  • "New Cryptography Method Promising Perfect Secrecy Is Met With Skepticism"
    A team of researchers from King Abdullah University of Science and Technology, the University of St. Andrews, and the Center for Unconventional Processes of Sciences claims to have demonstrated a "perfect secrecy cryptography system" that is resistant to…
  • "Mac Malware Threats Are Now Outpacing Attacks on Windows PCs"
    Researchers that work for a cybersecurity company Malwarebytes analyzed a year of data on cyberattacks their customers were affected with and found that malicious activity and malware attacks targeting Macs rose significantly over the past year.  In…
  • "Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems"
    A formal risk framework aimed at improving the development of secure machine learning (ML) systems has been developed by researchers at the Berryville Institute of Machine Learning (BIML). The BIML researchers conducted an architectural risk analysis of…
  • "New Legislation Would Help Local Gov with Cybersecurity"
    The recently introduced State and Local Cybersecurity Improvement Act aims to address cybersecurity threats faced by systems used by state, local, and territorial governments in the US. The legislation would establish a $400 million grant program at the…
  • "Hackers Could Shut Down Satellites – or Turn Them into Weapons"
    Amazon, U.K.-based OneWeb, and other companies are racing to put thousands of satellites in space. These satellites are expected to improve environmental monitoring, global navigation systems, and access to the internet in remote areas of the world.…
  • "Will Weak Passwords Doom the Internet of Things (IoT)?"
    Weak passwords are expected to be the downfall of the Internet of Things (IoT) security. Security experts have already observed an increase in attacks against IoT devices in which weak passwords were exploited. For example, in 2019, poor password…
  • "Study Unveils Security Vulnerabilities in EEG-Based Brain-Computer Interfaces"
    Researchers at Huazhong University of Science and Technology did a study on the security of electroencephalography (EEG)-based brain-computer interfaces (BCIs). Breakthroughs in machine learning (ML) have led to the advancement of BCI spellers, which…
  • "MIT Researchers Identify Security Vulnerabilities in Voting App"
    There has been increased interest in using mobile technology and the internet to improve access to voting. However, computer security experts warn of the vulnerability of mobile voting applications to hacking. Researchers at MIT did an analysis of a…