News
  • "Telegram, WhatsApp and Signal Open to Side-Channel Attacks"
    A warning has been issued by Cisco's Talos security research group pertaining to the insecurity of encrypted messaging apps Telegram, WhatsApp, and Signal. According to researchers, these apps that have been claimed to encrypt messages in transit are…
  • "Cryptography Failure Leads to Easy Hacking for Playstation Classic"
    The recently released PlayStation Classic has already been found to be vulnerable to a hack that could allow non-PlayStation software and more PlayStation games to be added to the plug-and-play device. This hack is possible as a result of weak…
  • "Protecting Our Digital Heritage in the Age of Cyber Threats"
    The Australian Strategic Policy Institute (ASPI) recently released a report, which emphasizes the importance of protecting national records that hold information pertaining to births, deaths, taxes, marriages, and more, from being hacked. If such records…
  • NYT Article on Apps Sharing Location Data
    New York Times has an investigative reporting article on the location sharing monitoring and sharing of data with mobile apps. It shows the use and detailed nature of the data. https://www.nytimes.com/interactive/2018/12/10/business/location-data-…
  • "Bug Bounty Hackers Bill Introduced into the U.S. Senate"
    A bill, called the Public-Private Cybersecurity Cooperation Act, has been proposed by a bipartisan pair of U.S. Senators. The aim of the bill is to require the creation of a vulnerability disclosure program by the Department of Homeland Security. The…
  • "Kubernetes Vulnerability Hits Top of Severity Scale"
    A major security vulnerability was recently discovered to be contained by the popular cloud container orchestration system, Kubernetes. The vulnerability could be exploited by authorized and unauthorized users to escalate privileges. This article…
  • "The Privacy Risks of Compiling Mobility Data"
    MIT researchers have conducted a new study that reveals the risks posed by the practice of compiling anonymized data consisting of location stamps to the privacy of users. Data from mobile phone records, Twitter accounts, and more, can be …
  • "Researchers Claim 400,000+ MikroTik Routers Infected With Mining Malware"
    According to researchers, more than 400,000 MikroTik routers have now been infected with cryptojacking malware that was first discovered in August. The cryptomining malware that mainly targeted MikroTik routers in Brazil, resulting in the infection of…
  • "ESET Discovers 21 New Linux Malware Families"
    ESET researchers have released details pertaining to the discovery of 21 new Linux malware families that are based on OpenSSH. The discovery of these Linux malware families calls for cybersecurity firms to pay more attention to Linux-focused malware.…
  • "Is Malware Heading Towards a WarGames-style AI vs AI Scenario?"
    As defense systems against cyberattacks continue to evolve with the help of artificial intelligence (AI) and machine learning (ML), cybercriminals alter their tactics to evade such systems. Cybercriminals are expected to use AI to make their malware…
  • "Consumers Believe Social Media Sites Pose Greatest Risk to Data"
    The results of a survey conducted by Gemalto to which 10,500 consumers responded, further indicate the impact that data breaches have on companies' reputation. Over 60% of those that participated in the survey expressed an avoidance of organizations that…
  • "New Cryptography Must Be Developed and Deployed Now, Even If Quantum Threats Are a Decade Away"
    Today's encryption algorithms are expected to be rendered obsolete by quantum computers in the future. A new report by the National Academies of Sciences, Engineering, and Medicine, emphasizes the importance of developing new cryptographic algorithms…