News
-
"10 Social Engineering Attacks Your End Users Need to Know About"The Verizon Data Breach Investigations Report has revealed that 43 percent of breaches within the last year were a result of social engineering attacks. Attackers are using more nontraditional methods of performing social engineering attacks to steal…
-
"Majority of Java Apps Are Susceptible to Hack Attacks"Findings of the 2017 State of Software Security Report released by Veracode, emphasizes the importance of patching open source components used within applications to prevent security breaches. An overwhelming majority of Java applications consist of at…
-
"Unbreakable Encrypted Messages"Chinese researchers have reached a significant milestone in the advancement of quantum communication. Researchers have demonstrated the transmission of quantum-entangled photon pairs to two Tibetan mountaintops more than 700 miles apart with the use of a…
-
"FTC Urged to Investigate ‘Easy’ to Hack Smartwatches for Kids"Tests conducted by security firm, Mnemonic, and the Norwegian Consumer Council (NCC), reveals major security flaws within Internet-connected smartwatches for children. The exploitation of these vulnerabilities would allow attackers to perform a…
-
"Cybercriminals Hijacked a Government Server to Send Sophisticated Malware to U.S. Companies"Research conducted by Cisco’s Talos team and other cybersecurity experts has revealed the hijacking of U.S. state government servers by an Eastern European to distribute phishing emails containing complex malware. An advanced persistent (APT) group that…
-
"Study Finds Auto-Fix Tool Gets More Programmers to Upgrade Code"As shown by the major data breach faced by Equifax, significant consequences may arise when programmers neglect to make essential upgrades to their internal software code. Patches applied to external libraries that are relied upon by software programs to…
-
"Serious Encryption Flaw in Infineon RSA Chips Exposes Billions of Devices to Attack"A security flaw within Infineon’s RSA library has been discovered by researchers, which could allow the RSA private key that matches with a generated RSA public key to be determined by attackers. The exploitation of this security vulnerability could…
-
"The Future of Cybersecurity Might Look a Lot Like Snapchat"The future of cybersecurity is expected to follow the design of Snapchat, a popular social media platform among millennials that allows users to send pictures and videos, which are then automatically deleted seconds after they have been opened by…
-
"Online School Wants to Train Arts Students in Cybersecurity"The launch of an online training platform in the UK aims to attract people to roles in cybersecurity, despite their background. As the impact of cyberattacks on organizations deepens, the need for skilled people to fight against such attacks has grown…
-
"Bad Passwords and Weak Security Are Making Ships an Easy Target for Hackers"As control systems within shipping vessels have become more connected, susceptibility to tracking and hacking of such vessels has increased significantly. More attention has been brought to the abundance of cybersecurity vulnerabilities contained by…
-
"Researchers Reveal Critical KRACK Flaws in WPA WiFi Security"“Key Reinstallation Attacks” (KRACK) have been discovered by security researchers to allow multiple vulnerabilities within the widely used WPA2 security protocol to be exploited by attackers, which would enable eavesdropping on Wi-Fi…
-
“DoubleLocker: Innovative Android Ransomware”Security researchers at ESET have discovered a new ransomware by the name of “DoubleLocker”, which targets Android devices. DoubleLocker has been discovered by researchers to be the first ransomware to abuse Android accessibility services as it is able…