News
  • "Russia Regularly Spoofs Regional GPS"
    A report published by the Center for Advanced Defense (C4ADS) highlights findings of an analysis of global positioning data. A key finding is the spoofing and blocking of satellite navigation signals by Russia. According to the report, at least 9,…
  • "Apple Secures iOS and macOS With New Updates"
    Apple updated its iOS mobile operating system to version 12.2 and its macOS Mojave desktop operating system to version 10.14.4.  This update has fixed numerous vulnerabilities that could have potentially exposed users to risk. Among the…
  • "HTTPS Isn't Always as Secure as It Seems"
    Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP that has become widely used by websites. HTTPS uses the Transport Layer Security (TLS) protocol to secure connections between browsers and web servers in order to prevent the…
  • "Ransomware Forces Two Chemical Companies to Order 'Hundreds of New Computers'"
    Following the LockerGoga ransomware attack on the Norwegian aluminium company, Norsk Hydro ASA, two U.S.-based chemical companies, Hexion and Momentive, were also hit with the same ransomware. It was discovered that the language used in the ransom…
  • "DHS Warns of Vulnerabilities in Implanted Defibrillators"
    The U.S. Department of Homeland Security (DHS) has issued warnings pertaining to the vulnerability of heart devices made by Medtronic PLC to being hacked. According to DHS, 16 different models of Medtronic implantable defibrillators contain two kinds of…
  • "Spotting Hacks Automatically, Before the Hackers Do"
    Computer scientists at TU Kaiserslautern, Germany, together with researchers from Stanford University in California have led a team that developed a new approach to finding flaws in new chip designs prior to the chips being manufactured. The novel…
  • "Asus Confirms Attack Against Update Tool That Exposed Users to Risk"
    Hackers were able to obtain access to Asus' servers, the attackers took aim at the Asus Live Update tool, which is used to deliver driver and firmware updates to customers.  The attackers were able to inject Trojan code into the Asus Live…
  • "Mega European Project on Cybersecurity and Data Protection"
    The objective of the European Commission's project, CyberSec4Europe, is to establish international standards pertaining to cybersecurity as well as strengthen Europe's security capabilities. CyberSec4Europe is one of four pilot projects of Horizon 2020,…
  • "Family tracking app spilled pics, names and real-time location data"
    The Family Locator app has an insecure MongoDB database, hosted in a cloud, stored real-time, unencrypted location data about all registered members. The Family Locator app had a  FollowMe feature which allowed…
  • SoS Musings #24 - Credential Stuffing Attacks
    SoS Musings #24 Credential Stuffing Attacks
  • Cyber Scene #31 - We're Number One!
    Cyber Scene #31 We're Number One!
  • "Security Researchers Hack and Take Home Tesla Model 3"
    Tesla rewarded a team of security researchers with a Tesla Model 3 in addition to a cash prize for their discovery and exploitation of a security vulnerability in the vehicle's system at the 2019 Pwn2Own hacking competition. Through the exploitation of a…