News
  • "Exchanging Information Securely Using Quantum Communication in Future Fiber-Optic Networks"
    Quantum technology is expected to improve the security of communication channels. Researchers at the National Institute of Information and Communications Technology in Japan are conducting research in which they explore the possibility of performing…
  • "5 ways employees can weaken your cybersecurity defenses"
    Cyber security is becoming more important for businesses as more businesses become more dependent on using computers.  It is critical to take cyber security seriously, and that has to begin with training staff on how to be careful of attacks.  …
  • "Internet-Connected Mr. Coffee Machines Have Security Vulnerability, Mcafee Says"
    McAfee recently released information pertaining to the vulnerability of a connected coffee maker to being hacked. According to the security firm, the coffee maker produced by Mr. Coffee and Wemo contains a security vulnerability that could enable hackers…
  • "Researchers Break E-Signatures in 22 Common PDF Viewers"
    Researchers at Ruhr-University Bochum in Germany have revealed vulnerabilities in PDF document viewers that could allow attackers to alter documents without invalidating electronic signatures. Three different attacks that could be performed through the…
  • "TurboTax Users Hit by Credential Stuffing Attack"
    TurboTax users have been affected by a Credentail Stuffing Attack.  The attack can allow an unathorized party to access ones acount and may obtain information contained in a prior year’s tax return or ones current tax return in…
  • "Lab Instruments May Be Leaking Patient Data, Study Finds"
    A study conducted by researchers at the University of California brings attention to the leaking of valuable information from lab instruments such as DNA synthesizing machines. According to researchers, the acoustic noise produced by a DNA synthesizer…
  • "Supermicro Hardware Weaknesses Let Researchers Backdoor an IBM Cloud Server"
    According to researchers at Eclypsium, the insecurity of baseboard management controllers (BMCs) poses a threat to the security of a premium cloud service provided by IBM, called bare-metal cloud computing. The vulnerabilities contained by BMCs could…
  • "Your Bionic Hand Is Now at Risk from Hackers"
    New research emphasizes the need to consider the cybersecurity of modern prosthetics such as bionic hands. Bionic hands developed by Moscow-based company, Motorica, provide smart features, which are connected to a remote cloud system. An examination of…
  • "Instagram data from 14 million profiles found in unsecured database, researcher says"
    Information about more than 14 million Instagram users accounts are being kept in an unsecured database.  This could render Instagram users to be vulnerable to hackers. Cyberscoop reports: "Instagram data from 14 million…
  • "Accidental Data Breaches Are Often Compounded by a Failure to Encrypt"
    Findings of a national survey commissioned by Egress to which security professionals responded, show that accidental data breaches are often the result of a lack of encryption by organizations as well as the exposure of data by employees through the use…
  • "Cyber security for Kids"
    Children are now being born in a cyber age, which means that if they are not taught cyber-knowledge at a young age, then that can represent a weakness from a security point-of-view.    Cyber Defence Magazine reports: "Cyber security for…
  • "Phishing Scam Cloaks Malware With Fake Google reCAPTCHA"
    A phishing campaign targeting a Polish bank and its customers was found to be using fake Google reCAPTCHAs to make its malicious landing page appear legitimate. The Android banking Trojan that is being distributed in this campaign is called BankBot,…