News
  • "Boosting State Website Security"
    The security weaknesses in the Domain Name System (DNS) call for the increased implementation of DNSSEC by state governments. DNSSEC is a technical standard that enhances the security of the DNS by adding cryptographic signatures to DNS records. This…
  • "For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records"
    A company by the name of mSpy has recently leaked sensitive information belonging to millions of its customers. mSpy provides phone monitoring software that allows users to spy on the mobile devices used by their children and partners. Nitish Shah, a…
  • "Access Misconfiguration Opens 3D Printers to Remote Attacks"
    Security researchers have brought attention to the vulnerability of over 3,700 3D printers to being attacked remotely. This vulnerability is due to the exposure of OctoPrint interfaces online without authentication. OctoPrint is an open source web…
  • "Knock, Knock: Digital Key Flaw Unlocks Door Control Systems"
    As a result of a flaw discovered in a commonly-used door controller, doors in corporate buildings such as office buildings and factories, could be unlocked by attackers. According to David Tomaschik, a security researcher from Google, the flaw…
  • "Researchers Claim Browser Vulnerability Puts Millions of Wi-Fi Networks at Risk"
    Browsers based on the Chromium open source project such as Google Chrome, Opera, and more, have been discovered by researchers from SureCloud to contain a flaw that would allow millions of home Wi-Fi networks to be hacked. The vulnerability derives from…
  • Pub Crawl #18
     
  • "What Teenagers Need to Know About Cybersecurity"
    Sanjay Goel, director for cybersecurity programs in the University at Albany’s School of Business, has emphasized the importance of raising teenagers' cybersecurity awareness as they increasingly utilize technology for both learning and entertainment. It…
  • "Fortnite Is Setting a Dangerous Security Trend"
    The decision of Fortnite's developer, Epic Games, to bypass the official Google Play store and independently distribute the popular video game is expected to set a dangerous precedent. As official app stores enforce certain security protections, the…
  • "Researchers Used Sonar Signal From a Smartphone Speaker to Steal Unlock Passwords"
    Researchers from Lancaster University have demonstrated the possibility of using a smartphone's microphone and speaker system to steal the unlock password to the device. The acoustic side-channel attack, called SonarSnoop, can be used by attackers to…
  • "Researchers Show Alexa 'Skill Squatting' Could Hijack Voice Commands"
    A team of researchers from the University of Illinois at Urbana-Champaign (UIUC) has described an attack method, called skill squatting, that could be used to phish users of the Amazon Echo. The attack involves the exploitation of errors made in the…
  • "ORNL Researchers Enable Real-Time Forensic Analysis with New Cybersecurity Tool"
    A new cybersecurity tool, called Akatosh, has been developed by researchers at the US Department of Energy's (DOE's) Oak Ridge National Laboratory (ORNL). Akatosh, together with intrusion detection systems (IDSs), will improve upon the…
  • "'Evil Internet Minute' Report Shows Scale of Malicious Online Activity"
    Cyber threat intelligence firm, RiskIQ, helps organizations identify the vulnerabilities and risks that they are facing so proper defense strategies can be adopted and executed. These vulnerabilities and risks are identified through the use of web…