News
-
“Researchers Find Vulnerability in Smart Home Control Apps”Researchers at Rapid7 have discovered that Android applications used to control smart home hubs, Wink Hub 2 and Instead Hub, store sensitive information within configuration files in plaintext form. This sensitive information includes access credentials…
-
“Researchers Investigate Heart Scan for Computer Security Identification”A team of researchers at the University at Buffalo have developed a computer security system in which biometric scanning is performed on the dimensions of a person’s heart for identification. This new form of biometric identification measures and…
-
“1.4 Million Phishing Sites Are Created Monthly”A new report released by Webroot reveals that an alarming amount of phishing sites are being created each month. As indicated by data collected by Webroot, an average of 1.385 million phishing sites are being developed by hackers every month. These…
-
“Setting the Standard for a Blockchain Protocol for IoT”The Trusted IoT Alliance has been formed among blockchain technology companies and enterprises such as Cisco, Gemalto, and Bosch. This alliance is in support of the development and establishment of a standard to be followed by an open source blockchain…
-
“Compliance and Data Privacy Regs IT Security Pros Should Worry About”As the official enforcement of the EU’s General Data Protection Regulation (GDPR) approaches, concerns of IT security professionals pertaining to challenges in regulatory compliance and data privacy have been heightened. Organizations are expected to…
-
"Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues"A team of researchers at Positive Technologies have demonstrated how the exploitation of vulnerabilities within the Signaling System 7 (SS7) protocol could allow malicious actors to perform a number of malicious activities such as gaining access to Gmail…
-
“Don't Rely On an Unlock Pattern To Secure Your Android Phone”Security researchers at the U.S. Naval Academy and the University of Maryland Baltimore County have published a study in which they demonstrate the ease at which a shoulder-surfing snooper could visually detect and recreate an Android unlock pattern. The…
-
“Mobile Ransomware Hits Browsers with Old-School Techniques”Ransomware is expected to increasingly target mobile devices such smartphones and tablets as tools and services for performing such attacks on these devices become more accessible to cybercriminals via the dark web. According to researchers from…
-
“Organizations Worried Tech Skills Gap Will Expose Them to Security Vulnerabilities”A survey conducted by Tripwire emphasizes the problematic cybersecurity skills gap within organizations as an overwhelming majority of respondents believe that the need for technically skilled security staff has grown in the past couple of years.…
-
“AI Slurps, Learns Millions of Passwords to Work out Which Ones You May Use Next”A team of researchers at the Stevens Institute of Technology have released a paper, detailing a method in which they use machine learning systems to predict the passwords that users will use. The technique demonstrated by researchers called “PassGAN”,…