News
-
"A Diabolical Way of Hacking a Chip With a Wave of Your Hand"Founder of Red Balloon Security, Ang Cui, and research scientist, Rick Housley, have discovered a new way in which a processor could be hacked, with the use of self-built electromagnetic pulsing equipment to raise faults within targeted hardware. This…
-
"Insider threats fastest growing cybersecurity concern"According to survey results published by Harvey Nash/KPMG and observations made by cybersecurity experts at Spohn Security Solutions, a large portion of threats to cybersecurity originate from within an organization and this type of security risk is the…
-
"Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access"Researchers have discovered a vulnerability known as Stack Clash that could allow an attacker to launch code via root access, which Linux, BSD, Solaris and other open source systems are vulnerable to. This article further discusses the risks posed by…
-
"Quantum Computing's Threat to Public-key Cryptosystems"There are concerns pertaining to what will be done about current public-key encryption when commercially viable quantum computers are fully available. Concerns arise from future quantum computing being able to break the current most popular public-key…
-
"Girl Scouts will offer new cybersecurity badges to increase its STEM focus"The Girl Scouts organization will be collaborating with Palo Alto Networks, an internet security company, to implement 18 new badges, which will recognize skills in cybersecurity. These badges will promote the learning of a variety of cyber topics,…
-
"New Vulnerability Could Give Mirai the Ability to Survive Device Reboots"A new vulnerability discovered by researchers from Pen Test enables infections from the Mirai IoT worm and other IoT malware to remain on devices, despite their reboots. Consequently, this vulnerability could lead to the development of permanent IoT…
-
"Scientists Make Quantum Leap Toward Secure Quantum Internet"Researchers at the University of Science and Technology in Hefei, China have made major headway for a global quantum secure internet. This development makes significant advancements to the confidentiality of data as the workings of subatomic particles…
-
"Protecting auto computer systems from hacks"Emre Koksal’s electrical and computer engineering research at Ohio State University have introduced an approach to further securing wireless systems used by vehicles in order to combat security threats such as fraudulent signals or messages. This…
-
"Mac Malware Installs Ransomware, Spyware, Security Firms Say"According to security researchers at AlienVault and Fortinet, malware targeting Macs are expected to increase as indicated by the discovery of two new malware-as-a-service threats being circulated within the dark web. These threats, which have been…
-
"E-cigarettes can be used to hack computers"Hackers can now use electronic cigarettes to hack into computers as demonstrated by security researchers and experts. At BSides London, Ross Bevington gave a presentation in which he reveals how a computer could be hacked by using an e-cigarette to…
-
"New Attack Method Delivers Malware Via Mouse Hover"Researchers have discovered a new strategy in which attackers could launch malware attacks. This technique allows a variant of the OTLARD banking Trojan, GootKit, to be downloaded via the hovering over a hyperlinked text or image within a Microsoft…
-
"'Crash Override': The Malware That Took Down a Power Grid"Analyses shared by researchers at ESET and Dragos Inc. suggest that the December 2016 power outage that occurred in the city of Kiev was a testing of an even bigger critical infrastructure-targeting malware. This malware, which has been dubbed the “…