News
-
"Sound Used to Track Movement via Smartphone and Laptops Speakers"According to researchers at the University of Washington, a person’s movements could be tracked by hackers via speakers and microphones within devices such as smartphones, laptops, and more. Researchers demonstrated the tracking system, “CovertBand”,…
-
"Researchers Built an Invisible Backdoor to Hack AI’s Decisions"NYU researchers performed a demonstration, which shows the ability to manipulate the behavior of artificial intelligence (AI) used in the functioning of self-driving autonomous cars and image recognition software. Researchers were able to train…
-
"Researchers devise app to protect PINs and passwords"Researchers at NYU Tandon School of Engineering have announced a new application that they have designed to protect PINs, passwords, and other authentication information from being stolen by hackers via “shoulder-surfing”. The application by the name of…
-
"Mac malware continuing to escalate, warn security researchers"Data collected by security firm, Malwarebytes, show that there has been a significant increase in malware targeting the Mac OS during 2017. Data also shows that more Mac malware families have emerged in the first half of 2017 than in previous years. The…
-
"Wanted: Metrics for Measuring Cyber Performance and Effectiveness"As organizations continue to face the evolving cybersecurity threat landscape, chief information security officers (CISOs) must face the difficult challenges of selecting which cybersecurity tools to implement into their systems and measuring the…
-
"Popular Messaging Apps: Encrypting Is Easy but Authenticating Is Hard"A recent study conducted by researchers at BYU reveal that users of popular messaging apps, Facebook Messenger, What’sApp, and Viber, are not fully utilizing security options made available on these apps, which leaves users vulnerable to fraud and other…
-
"'Pulse Wave' DDoS Attacks Emerge As New Threat"A new form of distributed denial-of-service (DDoS) attacks has been discovered by security vendor, Imperva. These DDoS attacks have been described as pulse wave attacks in which short bursts of malicious attack traffic are launched at multiple targets at…
-
"Seven Keys to Strengthen Your Cybersecurity Culture"In order for organizations to more effectively mitigate cybersecurity weaknesses, a culture of cybersecurity must be fostered within the workplace. Data breaches faced by companies are often the result of employee negligence, therefore further engagement…
-
"Researchers warn against 'hackable' robots"Researchers at IOActive have warned of flaws discovered within various commercially available robots, which could be exploited to allow hackers to physically harm and spy on users. Through the investigation of notable robots such as Pepper, Nao, and many…
-
"How One Energy Department Lab Uses Physics to Boost Cybersecurity"A new approach to cybersecurity has been designed by the Energy Department’s Oak Ridge National Laboratory (ORNL) to improve upon the speed and security of sharing and protecting encrypted data. This method uses quantum light particles (photons) rather…
-
"A Replacement Screen Could Offer Hackers A Key To Your Smartphone"According to a new study conducted by researchers at Ben-Gurion University, third-party smartphone replacement parts may consist of maliciously programmed chips, which could be used to hack smartphones in order to perform malicious activities and steal…