News
-
"This Leica Camera Stops Deepfakes at the Shutter - First Camera With Built-in Content Credentials Verifies Photos' Authenticity"The Leica M11-P, which was announced in late October, is the world's first camera to support content credentials, an encryption technology that ensures the authenticity of photos taken by the camera.
-
"The Study of PGP Web of Trust Based on Social Network Analysis"A study published in the International Journal of Business Information Systems used social network analysis to look at the most important and influential users employing Pretty Good Privacy (PGP) data encryption.
-
"Suspected China-Based Hackers Target Uzbekistan Gov't, South Koreans, Cisco Says"A new report reveals that the Uzbekistan Ministry of Foreign Affairs and people in South Korea are being targeted by hackers based in China using the SugarGh0st malware strain.
-
"The Vast Majority of Us Have No Idea What the Padlock Icon on Our Internet Browser Is – And It's Putting Us at Risk"According to a new study from Cardiff Metropolitan University, only 5 percent of UK adults understand the significance of the padlock in the Internet browser's address bar, posing a threat to online safety.
-
"AI: The New Puppet Master Behind Cyberattacks"Artificial Intelligence (AI)-driven social engineering attacks are reshaping the threat landscape.
-
"Understanding the Security of Mobile Apps in Africa"A team of researchers from CyLab-Africa and the Upanzi Network recently collaborated with Approov, a mobile security provider, to analyze the security of popular financial services apps used across Africa.
-
"Researchers Break Apple's New MacBook Pro Weeks After Release"A Georgia Tech researcher successfully bypassed security measures on Apple's latest MacBook Pro equipped with the M3 processor chip in order to get his fictitious target's Facebook password and second-factor authentication text. Jason Kim, a Ph.D.
-
"CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks"A CACTUS ransomware campaign has been spotted gaining a foothold in targeted environments by exploiting previously discovered security holes in the cloud analytics and business intelligence platform Qlik Sense.
-
"FjordPhantom Android Malware Uses Virtualization to Evade Detection"FjordPhantom, a new Android malware, was discovered using virtualization to execute malicious code in a container and avoid detection.
-
"CISA Urges Water Facilities to Secure Their Unitronics PLCs"Following news that Iran-linked attackers had taken control of a Programmable Logic Controller (PLC) at a water system facility in Pennsylvania, a public alert was published by the Cybersecurity and Infrastructure Security Agency (CISA) urging other wa
-
"How a Teenage Saudi Hacker Went From Lockpicking to Ransomware"Marco Liberale, a 13-year-old from Saudi Arabia, recently presented on navigating ransomware at the Black Hat Middle East and Africa conference.