News
  • "Intel ‘Spoiler’ Chip Flaw Uncovered By Researchers"
    A new chip flaw, called Spoiler, similar to that of Spectre has been discovered by security researchers at Worcester Polytechnic Institute and the University of Lübeck. Spoiler also abuses the speculative execution capabilities of Intel processors.…
  • "NSA Releases Cybersecurity Tool to the Public"
    The National Security Agency (NSA) has released a reverse engineering tool for malware called, Ghidra, which presents a significant contribution to the cybersecurity community. The source code of malware can be examined through the use of this tool to…
  • "Pirate matryoshka"
    The use of torrent trackers to spread malware is a well-known practice and is becoming more frequent.  Cybercriminals disguise files as popular software, computer games, media files, and other sought-after content to make somone click to…
  • "Chinese Hackers Use Phishing Emails to Target Engineering, Transport and Defense Companies"
    A state-sponsored Chinese hacking group has been identified by researchers at Fireye. The group, called APT40, has been discovered to be targeting U.S. companies, mainly in the engineering, transportation, and defense industries. This article continues…
  • "Massive macOS Vulnerability Exposed by Google Security Researchers"
    Google's Project Zero researchers have discovered a significant vulnerability in the macOS kernel. Hackers can exploit this vulnerability to modify mounted disk images without users knowing. This article continues to discuss the severity of the macOS bug…
  • "Most Laptops Vulnerable to Attack via Peripheral Devices"
    Researchers from the University of Cambridge and Rice University have brought further attention to the vulnerability of laptops and desktop computers to being hacked via peripheral devices such as chargers, docking stations, and projectors. According to…
  • "Best Practices for Balancing BYOD with Mobile Security"
    Mobile fraud is becoming more prevalent, while awareness is not.  That is why if a company has employees BYOD then it is important to have a policy in place that looks at security.  This article discusses the best practices in…
  • "The Overlooked Security Threat of Sign-In Kiosks"
    Vulnerabilities have been discovered to be contained by five mainstream visitor management systems, which are loaded on sign-in kiosks often used at businesses and facilities. These vulnerabilities would allow for the extraction of sensitive information…
  • "Exposing Flaws in Metrics for User Login Systems"
    A Rutgers University-New Brunswick study highlights flaws in the metrics used to measure the performance of authentication systems and proposes a solution towards measuring the success of such systems. The proposed method can be used by researchers,…
  • "Dow Jones Data Exposed on Public Server"
    Dow Jones data was exposed on a public server.  An "authorized third party" was blamed for not securely storing more than 2.4 million records of risky businesses and individuals on a public server without password protection. This is why…
  • "Hackers Can Spy on and Hijack Amazon Doorbell’s Video Feed"
    An investigation into the security of Amazon's Ring Doorbell revealed a vulnerability that could allow the video feed of the home security device to be hacked and spied on. A cybersecurity researcher at Dojo By BullGuard recently released details…
  • "'Thunderclap' security flaw in Thunderbolt spec could compromise USB-C and DisplayPort"
    The Thunderbolt connectivity specification has been found to contain a security flaw. According to a team of security researchers, the flaw called Thunderclap, could enable computers to be attacked through their USB-C or DisplayPort hardware. This…