News
  • "Researchers Find that Amazon Alexa Can be Hacked to Record Users"
    Security researchers from Checkmark have discovered that the Amazon Alexa voice assistant technology could be manipulated into recording and transcribing the verbal communications of a user. The performance of eavesdropping can be enabled through the…
  • HotSoS 2018 Summary Report
    HotSoS 2018 Summary Report
  • "Hackers Designed a 'Master Key' to Unlock Millions of Hotel Room Doors"
    Security researchers from F-Secure discovered a critical flaw in the design of VingCard’s Vision software used for electronic keys, which would allow millions of hotel rooms to be hacked. An attack developed by researchers, Tomi Tuominen and Timo…
  • "Accelerating Detection of Zero-Day Vulnerabilities"
    DARPA’s Information Innovation Office (I20) recently announced the Computers and Humans Exploring Software Security (CHESS) program. The CHESS program aims to improve upon the speed and scale at which zero-day vulnerabilities are detected and fixed. This…
  • “Orangeworm Cyber Attack Group Targets Health Sector”
    Orangeworm is a hacking group discovered by Symantec to be targeting organizations linked to the healthcare industry. According to researchers, the group has been launching a custom backdoor called Trojan.Kwampirs on medical devices and machines used by…
  • "Isolated, Air-Gapped Cypto-Wallets Hacked"
    Researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev demonstrated a way in which private keys could be siphoned from air-gapped cold wallets, which are offline cryptocurrency wallets used to store bitcoin. The demonstration performed by…
  • "'Gold Galleon' Hackers Target Shipping Industry"
    The group responsible for the launch of several extensive BEC attacks on the shipping industry has been identified by researchers from Dell SecureWorks Counter Threat Unit. The group called Gold Galleon, exploited the industry's inadequate security in…
  • "Researchers Propose Scheme to Secure Brain Implants"
    A method has been proposed by researchers from KU Leuven, Belgium, that would strengthen the security of implantable neurostimulators. According to researchers, the communications between the neurostimulator and its external device programmer lacks…
  • Cyber Scene #20 - Facebook Faceoff
    Cyber Scene #20 Facebook Faceoff
  • "The Public Has a Vital Role to Play in Preventing Future Cyber Attacks"
    An extensive hacking incident recently occured in which a signifiant number of Australian organizations were affected. The attack highlights the importance of taking on stronger approaches to defending against cyberattacks and educating the…
  • "First Public Demo of Data Breach via IoT Hack Comes to RSAC"
    A demonstration performed by security researchers at the 2018 RSA Conference shows a way in which novice attackers could compromise an IoT device and steal personally identifiable information. The demonstrated attack could be performed without…
  • “Trustjacking exploit abuses iTunes feature to spy on iOS devices”
    Symantec researchers at RSA 2018 have disclosed a technique dubbed “Trustjacking”. The technique allows attacker to spy on and gain control of devices via the Wi-fi sync feature in iTunes. This article further discusses Trustjacking, Apple’s response to…