News
  • "Hack Mobile Point-of-Sale Systems? Researchers Count the Ways"
    Security researchers from Positive Technologies have shared research findings surrounding the security of mobile point-of-sale (mPOS) systems. Researchers have found that mPOS readers provided by vendors, including Square, SumUp, PayPal and iZettle,…
  • "There is a Massive Hole in IoT Security, Says Avast Researcher"
    Avast security researcher, Martin Horn, further highlights the insecurity of IoT devices through the discovery of a new major security hole. According to Horn, smart homes are vulnerable to being hacked through the abuse of misconfigured Message…
  • "More Efficient Security for Cloud-Based Machine Learning"
    MIT researchers have created a new system to strengthen the security of sensitive data used in online neural networks without compromising the speed at which these networks operate. The system, called GAZELLE, combines two encryption techniques…
  • "IBM’s Proof-of-Concept Malware Uses AI for Spear Phishing"
    The increasing use of artificial intelligence (AI) in the defense against cyber threats is expected to be accompanied by the growing development of attack tools that weaponize AI. IBM has developed proof-of-concept malware called DeepLocker, which uses…
  • "Web Security Gets a Boost as TLS Gets Major Overhaul"
    The Internet Engineering Task Force (IETF) has recently published the finalized version of Transport Layer Security (TLS) version 1.3. TLS 1.3 ( RFC 8446 ) improves upon the speed, performance, and security of web communications. This article continues…
  • "Security Gaps Identified in Internet Protocol 'IPSec'"
    The Internet protocol, IPSec, has been revealed by researchers to be vulnerable to attacks. The vulnerability of IPSec is due to the insecurity of the Internet Key Exchange protocol, IKEv1, which is still being used in operating systems and newer…
  • "Password Managers Vulnerable to Insider Hacking"
    A team of researchers from Aalto University and the University of Helsinki have found security vulnerabilities in popular password managers used to store login credentials. The inadequate security of the inter-process communication (IPC) channel used by…
  • "Intel CPUs Afflicted with Fresh Speculative Execution Flaws"
    Researchers have discovered a new set of speculative execution vulnerabilities in Intel processors, called  L1 Terminal Fault (L1TF) flaws. The three new vulnerabilities affect Intel's Software Guard Extensions (SGX) technology, System…
  • "Hackers Can Seize Practically All Your Online Accounts, and It's Your Voicemail's Fault"
    Security researcher, Martin Vigo, has demonstrated the use of voicemail to take control of an individual's online accounts including PayPal, WhatsApp, Apple, and more. Through the use of voicemail, Vigo was able to reset passwords for online accounts.…
  • "Your Smart Air Conditioner Could Help Bring down the Power Grid"
    A new study done by researchers at Princeton University brings attention to the possible use of connected home appliances such as air conditioners and waters by hackers in the disruption of the power grid. According to researchers, these high wattage…
  • "NSA Research Looks at How Stress Impacts Cyber-Security Operations"
    The National Security Agency (NSA) presented details at Black Hat USA pertaining to research on how stress affects cybersecurity operations. According to the study conducted by the NSA, as a tactical cyber-operator experiences more frustration, their…
  • "Security Researchers Found a Way to Hack into the Amazon Echo"
    Tencent security researchers, HuiYu and Qian Wenxiang, demonstrated an attack method that could be used by hackers to listen in on unsuspecting users of Amazon Echo speakers. The technique uses a modified Echo speaker. This article continues to discuss…