News
  • "Design Flaws Create Security Vulnerabilities for 'Smart Home' Internet-of-Things Devices"
    Flaws in the design of smart home Internet of Things (IoT) devices have been discovered by researchers at North Carolina University. The discovery of these design flaws is shared in a paper, titled Blinded and Confused: Uncovering Systemic Flaws in…
  • "WhatsApp flaw used to install spyware by simply calling the target"
    A security vulnerability in the popular Facebook-owned end-to-end encrypted messaging app WhatsApp allowed attackers to install spyware on smartphones without any user interaction or knowledge. WhatsApp discovered the vulnerability in early May, and…
  • "Flaws in a Popular GPS Tracker Leak Real-Time Locations and Can Remotely Activate Its Microphone"
    Security vulnerabilities have been discovered in a popular GPS tracker used to monitor children, track vehicles, and send alerts pertaining to elderly patients. The white-label location tracker is manufactured in China and is sold by companies, including…
  • "Hackers Still Outpace Breach Detection, Containment Efforts"
    Reports recently released by security researchers, including the Trustwave 2019 Global Security Report and the FireEye 2019 Mandiant M-Trends Report, indicate that there has been an improvement in the discovery and containment of data breaches as…
  • "Three Ways GDPR Benefits US Companies"
    The European Union's General Protection Regulation (GDPR) went into effect on May 25, 2018. The purpose of the GDPR is to ensure the protection of personal data belonging to EU residents by enforcing a standard upon any companies that manage this data.…
  • "Despite warnings, most people still don’t change their passwords"
    1050 individuals were surveyed about their passwords.  It was discovered that 64% of people used the same password for some, or even all, of their online accounts, while only 21% used a different password for each account. 21% of the…
  • "Artificial Intelligence May Not 'Hallucinate' After All"
    Great advancements have been made in machine learning in regard to image recognition as this technology can now identify objects in photographs as well as generate authentic-looking fake images. However, the machine learning algorithms used by image…
  • "This Ransomware Sneakily Infects Victims by Disguising Itself With Anti-Virus Software"
    According to cybersecurity researchers at Trend Micro, ransomware, called Dharma, which emerged in 2016, has been updated to deceive users into installing it by posing as anti-virus software. New details pertaining to the updated version of Dharma…
  • "Study Finds Wi-Fi Location Affects Online Privacy Behavior"
    A team of scientists conducted a study to see if a person's location offline affects how they behave online in regard to privacy. The study also explores changes in online privacy behavior resulting from the presence of a virtual private network (VPN)…
  • "Bypassing Popular Passwords"
    A new model for password protection has been proposed by Jaryn Shen and Qinqkai Zeng of the State Key Laboratory for Novel Software Technology, and Department of Computer Science and Technology, at Nanjing University, China. The new approach is aimed to…
  • "The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors"
    There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017.  It has jumped from 15 percent to 26 percent, and the results might actually be greater, because most organizations…
  • "Critical flaw allows attackers to take over Cisco Elastic Services Controllers"
    Cisco had a critical flaw which allowed attackers to take over Cisco Elastic Services Controllers (ESC). ESC is a popular enterprise software for managing virtualized resources. The vulnerability is due to improper validation of API requests.…