News
  • "Decade-Old Bluetooth Flaw Lets Hackers Steal Data Passing Between Devices"
    A major flaw in the Bluetooth specification could allow attackers to perform malicious activities such as monitor and interfere with data transmitted wirelessly between vulnerable devices. The exploitation of this vulnerability could expose sensitive…
  • "Flaw Let Researchers Snoop on Swann Smart Security Cameras"
    Security researchers have discovered vulnerabilities in smart security cameras made by Swann. These vulnerabilities could be exploited by attackers to spy on users via audio and video streams. This article continues to discuss the security flaw in…
  • "New Report Shows Pen Testers Usually Win"
    A report recently released by Rapid7 Global Consulting explores the practice of penetration testing through the examination of results from 268 client engagements. According to the report, vulnerabilities in software and user credentials are the most…
  • "Dark Web Cyber Crime Markets Thriving"
    An analysis of the dark web was performed by researchers at Positive Technologies. Researchers examined the tools and services advertised on dark web markets and how much it costs to use them in the launch of cyberattacks. This article continues to…
  • "Security Concerns Around the Rapidly Growing Use of the Industrial Internet of Things"
    A survey conducted by the SANS Institute highlights security concerns raised by the increasing use of Industrial Internet of Things (IIoT). IIoT refers to physical internet-connected devices used within different critical infrastructure sectors such as…
  • "Using Machine Learning to Detect Software Vulnerabilities"
    A new vulnerability detection system has been developed by a team of researchers from Draper and Boston University. The system uses machine learning algorithms for the automated detection of software vulnerabilities. Although researchers have focused…
  • “Google Starts Labeling All HTTP Sites as ’Not Secure’”
    Over the last several years, Google has been pushing for better website security, and as of yesterday, the company has made a huge change with Chrome 68. From now on, any website connected to Google Chrome that is still using HTTP will be flagged with…
  • "World-First Program to Stop Hacking by Quantum Supercomputers"
    A post-quantum secure algorithm has been created by IT experts at Monash University to prevent attacks launched by quantum supercomputers. The L2RS algorithm is said to be a significant advancement in the preservation of user privacy and security of…
  • "Malware Author 'Anarchy' Builds 18,000-Strong Huawei Router Botnet"
    A massive botnet composed of 18,000 infected Huawei routers, has been built by an attacker by the name of Anarchy. The botnet was built through the exploitation of a vulnerability in Huawei HG532 routers. This article continues to discuss the…
  • "157 GB of Highly Sensitive Data Exposed from Tesla, Toyota, Ford, GM, VW and More"
    A security researcher at UpGuard discovered the exposure of highly sensitive data on the web due to an unsecured backup server owned by Level One Robotics and Controls. The data breach exposed trade secrets and corporate documents of automakers…
  • "Team Suggests a Way to Protect Autonomous Grids from Potentially Crippling GPS Spoofing Attacks"
    The vulnerability of cyber physical systems such as energy infrastructure systems, to disruptive cyberattacks increases as the connectivity and complexity of these systems grow. A new method for the protection of the power grid from cyberattacks such as…
  • "Utilities Will Have Stricter Cybersecurity Reporting Requirements Under New Ruling"
    The Federal Energy Regulatory Commission (FERC) has ordered the development of new standards by the North American Electric Reliability Corporation (NERC). These standards aim to enhance the mandatory reporting of cybersecurity incidents faced by…