News
  • "SIM Swap Attacks Making Two-Factor Authentication via Smartphones Obsolete"
    Security researchers at PhishLabs further emphasized that SIM swap attacks are making SMS two-factor authentication (2FA) obsolete. A SIM swapping attack refers to the performance of social engineering to trick mobile carriers into transferring control…
  • "Software Detects Backdoor Attacks on Facial Recognition"
    The growing use of facial and object recognition by the US Army to train artificial intelligent (AI) systems in the identification of threats call for increased efforts toward bolstering the security of such technology against attacks. Researchers at…
  • "Detecting and Mitigating Network Attacks With a Multi-Prong Approach"
    An international team of researchers developed an approach to detecting malicious attacks such as jamming attacks, replay attacks, and more, on the communication network and the physical system in a networked control system. These types of attacks often…
  • "Apps are Sharing More of Your Data With Ad Industry Than you may Think"
    In a new study, researchers analyzed data traffic from ten popular Android apps (which are also all available on iPhones). The ten apps researched include Grindr, OkCupid, Tinder, Clue, MyDays, Perfect365, My Talking Tom 2, Qibla Finder, Happn, and Wave…
  • "'Cable Haunt' Vulnerability Exposes 200 Million Modem Cables to MITM Attacks"
    Researchers from Lyrebirds, along with an independent researcher, discovered a security vulnerability, named Cable Haunt, in Broadcom's cable modem. The flaw left an estimate of 200 million home broadband gateways susceptible to remote hijacking attacks…
  • "Lawmakers Ask FCC to Protect Consumers from Phone Hijackers"
    Lawmakers are asking the Federal Communications Commission (FCC) to use the regulatory agency's authority over wireless carriers to enforce better protection for consumers from SIM swap scams. Fraudsters perform these scams by persuading wireless…
  • "How to Implement a 'Threat Model' to Beef up Your Organization’s Security"
    Security professionals are encouraged to practice threat modeling to bolster the security of their organizations. Threat modeling refers to the classification of assets associated with a system, identifying the possible attacks against these assets, the…
  • "2020 Forecast: Attackers Will Target Non-Traditional Systems"
    Researchers believe that API security is going to be a significant threat surface in 2020. The increase of using container ecosystem and the popularity of mobile apps that connect to backend services have pushed the microservices architecture to the…
  • "Texas School District Loses $2.3M to Phishing Attack"
    A new phishing attack has affected The Manor Independent School District (MISD), located roughly 15 miles outside Austin, Texas. MISD made three payments amounting to 2.3 million dollars. The school did not realize the bank account information got…
  • "Exploit Fully Breaks SHA-1, Lowers the Attack Bar"
    Researchers from INRIA in France and the Nanyan Technological University in Singapore developed a proof-of-concept attack that is capable of breaking the Secure Hash Algorithm-1 (SHA-1) code-signing encryption. The exploit developed by Gaetan Leurent and…
  • "A Case for Establishing a Common Weakness Enumeration for Hardware Security"
    Attacks on modern computers are growing more frequent, pervasive, and sophisticated because they are not only impacting the software layer but also the hardware layer. The industry is bolstering efforts to deliver microarchitectural improvements that…
  • "A Billion Medical Images Are Exposed Online, As Doctors Ignore Warnings"
    Security researchers from the Germany-based security firm Greenbone Networks discovered the exposure of a billion medical images online. The exposure of these images is the result of hospitals, medical offices, and imaging centers using unprotected…