News
-
"Machine Learning Can Use Tweets To Spot Critical Security Flaws"A team of researchers is developing a system that uses machine learning to pull information from tweets on Twitter pertaining to hackable software flaws as well as predict these flaws' level of severity. Based on the language used to describe …
-
"AT&T joins cyber security group co-founded by Singtel"AT&T has joined a global cyber security alliance co-founded by Singtel. AT&T's has also recently acquired AlienVault, a cyber security solutions provider founded in Spain and headquartered in the United States. This will allow AT…
-
"Securing the 'Internet of Things' in the Quantum Age"Despite the major advancements that quantum computing will bring to the realms of medical research, drug discovery, and more, this technology is also expected to render currently used encryption algorithms obsolete due to the quantum-mechanical…
-
"Intel ‘Spoiler’ Chip Flaw Uncovered By Researchers"A new chip flaw, called Spoiler, similar to that of Spectre has been discovered by security researchers at Worcester Polytechnic Institute and the University of Lübeck. Spoiler also abuses the speculative execution capabilities of Intel processors.…
-
"NSA Releases Cybersecurity Tool to the Public"The National Security Agency (NSA) has released a reverse engineering tool for malware called, Ghidra, which presents a significant contribution to the cybersecurity community. The source code of malware can be examined through the use of this tool to…
-
"Pirate matryoshka"The use of torrent trackers to spread malware is a well-known practice and is becoming more frequent. Cybercriminals disguise files as popular software, computer games, media files, and other sought-after content to make somone click to…
-
"Chinese Hackers Use Phishing Emails to Target Engineering, Transport and Defense Companies"A state-sponsored Chinese hacking group has been identified by researchers at Fireye. The group, called APT40, has been discovered to be targeting U.S. companies, mainly in the engineering, transportation, and defense industries. This article continues…
-
"Massive macOS Vulnerability Exposed by Google Security Researchers"Google's Project Zero researchers have discovered a significant vulnerability in the macOS kernel. Hackers can exploit this vulnerability to modify mounted disk images without users knowing. This article continues to discuss the severity of the macOS bug…
-
"Most Laptops Vulnerable to Attack via Peripheral Devices"Researchers from the University of Cambridge and Rice University have brought further attention to the vulnerability of laptops and desktop computers to being hacked via peripheral devices such as chargers, docking stations, and projectors. According to…
-
"Best Practices for Balancing BYOD with Mobile Security"Mobile fraud is becoming more prevalent, while awareness is not. That is why if a company has employees BYOD then it is important to have a policy in place that looks at security. This article discusses the best practices in…
-
"The Overlooked Security Threat of Sign-In Kiosks"Vulnerabilities have been discovered to be contained by five mainstream visitor management systems, which are loaded on sign-in kiosks often used at businesses and facilities. These vulnerabilities would allow for the extraction of sensitive information…
-
"Exposing Flaws in Metrics for User Login Systems"A Rutgers University-New Brunswick study highlights flaws in the metrics used to measure the performance of authentication systems and proposes a solution towards measuring the success of such systems. The proposed method can be used by researchers,…