News
  • "Google Photos Vulnerability Could Have Let Hackers Retrieve Image Metadata"
    A flaw in the web version of Google Photos could have enabled hackers to track a user's location history. Through the exploitation of this flaw, attackers could have retrieved metadata from images stored in a user's Google Photos account to find out…
  • "Experts uncovered a malspam campaign using Boeing 737 Max crash"
    Hackers always try their best to exploit the attention of the people on the events that made the headlines. Especially tragic events like Boeing 737 Max crash or the mosque shooting in New Zealand.  Threat actors are sending emails posing as a…
  • "Donated Devices Are Doxing Your Data, Says New Research"
    A security researcher from Rapid7 found more than 300,000 files that reveal sensitive information such as credit card numbers, Social Security numbers, driver's license data, and more. These files were discovered as a result of the analysis of 85…
  • "Security Researchers Reveal Defects That Allow Wireless Hijacking of Giant Construction Cranes, Scrapers and Excavators"
    Security researchers at Trend Micro have brought further attention to the possibility of hijacking massive industrial machines such as cranes, excavators, and scrapers, through the abuse of poorly secured radio frequency (RF) remote controllers.…
  • "What recent industry data leaks tell us about CYBER-SECURITY"
    The number of reported data breaches has not  risen much over the last decade.  The concern now, is not just how many breaches occur, but more the amount of data that is stolen. Hackers are becoming much more proficient in stealing…
  • "Proof-of-Concept Tracking System Finds RATs Worldwide"
    Recorded Future, an information analysis firm, recently released a report that discusses a proof-of-concept system designed for the detection of remote-access Trojans (RATs). The system uses network scans and metadata to find RATs. This article continues…
  • "Shared Code Creates Opportunity for Hackers, Expert Warns"
    The use of open source code libraries by app developers increases the vulnerability of federal employees' mobile phones to being infiltrated by hackers as such libraries can include malicious code. The hacking of federal employees' smartphones could lead…
  • "Anti-Virus on Android: Beware of Low-Quality Apps"
    Most of the anti-virus applications on Google Play Store for androids are very low quality.  More than half of the apps - 138 out of 250 detected 30 percent or less of the malicious samples or had high false-positive rates.  This means…
  • "An Email Marketing Company Left 809 Million Records Exposed Online"
    Security researchers found an unprotected MongoDB database owned by Verifications.io, an enterprise email validation service provider. The database contains 150 gigabytes of data that exposes over 800 million records. These records include sensitive…
  • "RSAC 2019: The Dark Side of Machine Learning"
    Nicholas Carlini, a researcher at Google, gave an overview of the different types of adversarial attacks that can be launched against machine learning systems. These attacks could lead to the misclassification of images and sounds by machine learning…
  • "Source Code Error in Swiss Post E-Voting System"
    Security researchers have discovered a vulnerability in a Swiss e-voting system that could lead to the modification of votes. The vulnerability comes from a weak cryptographic system in which votes are verified. This article continues to discuss the flaw…
  • DARPA Creates Secure Voting Project
    DARPA has funded Galois with $10 million to develop a secure voting platform based on secure systems research. These machines are two parts, an touchscreen part that prints paper receipts and an optically scan device. The votes have cryptographic…