News
  • "Digital License Plates: Will This New Way to Track Vehicles Enhance or Undermine Privacy?"

    California began allowing drivers to purchase digital license plates from a company named Reviver in 2022, joining Michigan and Arizona in permitting such plates. The plates are miniature television screens that replace traditional metal license plates.…

  • "Experts Published a List of Proxy IPs Used by the Pro-Russia Group Killnet"

    Researchers at SecurityScorecard published a list of proxy IPs used by the pro-Russian group Killnet in an effort to disrupt its operations and thwart its attacks. The disclosed list of proxy IPs is meant to help organizations block the Killnet…

  • "Inadequate Cybersecurity Investments Leave Rail Industry at Risk"

    With the emergence of connected online systems and the convergence of Operational Technology (OT) and Information Technology (IT) systems, network and data-sharing security between IT and OT systems is becoming an integral part of safety, creating new…

  • "GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks"

    A new US Government Accountability Office (GAO) assessment of the nation's critical infrastructure cybersecurity recommends a more robust role for the federal government in protecting Industrial Control Systems (ICS), especially those that operate the…

  • "Tor and I2P Networks Hit by Wave of Ongoing DDoS Attacks"

    Isabela Dias Fernandes, executive director of the Tor Project, recently revealed that Distributed Denial-of-Service (DDoS) attacks had targeted the Tor network since at least July 2022. At times, the network was so severely disrupted by the attacks that…

  • "Gootkit Malware Adopts New Tactics to Attack Healthcare and Finance Firms"

    Cybereason reports that the Gootkit malware targets primarily healthcare and banking organizations in the US, UK, and Australia. According to the cybersecurity firm, it analyzed a Gootkit incident in December 2022 that involved a new deployment method,…

  • "New 'Invisible Finger' Technology Poses Potential Phone-Hacking Threats, Researchers Say"

    Researchers from the University of Florida revealed new technology that enables the hacking of nearby touchscreen-enabled devices using an "invisible finger." The discovery, which was acknowledged by the Institute of Electrical and Computer Engineering…

  • "Are VPNs Really the Answer?"

    According to researchers at the University of Michigan (U-M), a Virtual Private Network (VPN) can be one tool in an Internet user's toolbox, but it is insufficient in meeting all privacy needs. Thousands of Internet users rely on VPNs to protect their…

  • "Chrome 110 Patches 15 Vulnerabilities"

    Google recently announced that the first stable release of Chrome 110 brings 15 security fixes, including ten that address vulnerabilities reported by external researchers.  Of the externally reported bugs, three are rated high severity.  …

  • "More Than 2,000 Cybersecurity Patent Applications Filed Since 2010"

    There has been a surge in cybersecurity-related patent applications over the past decade, with US companies filing the most. IS Decisions, a French software company, estimates that around 2,270 patents pertaining to cybersecurity have been filed since…

  • "NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices"

    Security experts at the National Institute of Standards and Technology (NIST) have recently announced a victor in their program to find a worthy defender of data generated by small devices.  The winner, a group of cryptographic algorithms called…

  • "Russian Threat Group Suspect Uses Screenshotting to Observe Victims Before Striking, Says Analyst"

    Proofpoint researchers have observed a new threat group, tracked as TA866, spreading malware via phishing emails since October 2022. Although the group's main motive is suspected to be financial gain, an analysis of associated operations reveals that…