News
-
"Researchers Show Alexa 'Skill Squatting' Could Hijack Voice Commands"A team of researchers from the University of Illinois at Urbana-Champaign (UIUC) has described an attack method, called skill squatting, that could be used to phish users of the Amazon Echo. The attack involves the exploitation of errors made in the…
-
"ORNL Researchers Enable Real-Time Forensic Analysis with New Cybersecurity Tool"A new cybersecurity tool, called Akatosh, has been developed by researchers at the US Department of Energy's (DOE's) Oak Ridge National Laboratory (ORNL). Akatosh, together with intrusion detection systems (IDSs), will improve upon the…
-
"'Evil Internet Minute' Report Shows Scale of Malicious Online Activity"Cyber threat intelligence firm, RiskIQ, helps organizations identify the vulnerabilities and risks that they are facing so proper defense strategies can be adopted and executed. These vulnerabilities and risks are identified through the use of web…
-
"Simple but Extremely Effective: Inside the World's Most Prolific Mobile Banking Malware"A mobile banking Trojan known as Asacub has now been active for a few years. Funds and banking information belonging to over 225,000 have been stolen through the launch of Asacub. Victims of this malware have been located primarily in Russia thus far.…
-
"Researchers Shine Light on Smart-Bulb Data Theft"Research conducted by the University of Texas at San Antonio has proven that the light produced by smart bulbs can be used in the performance of two separate types of attacks. The attacks described by researchers can allow malicious actors to exfiltrate…
-
"NIST Issues Guidance for Protecting Medical IoT Devices"The National Institute of Standards and Technology (NIST) in collaboration with the National Cybersecurity Center of Excellence (NCCoE) has provided guidance pertaining to the security of wireless infusion pumps, which are used to deliver doses of…
-
"Qrypt Licenses ORNL’s Quantum Random Number Generator to Bolster Encryption Methods"A quantum random number generator (QRNG) from the U.S. Department of Energy's (DOE) Oak Ridge National Laboratory (ORNL) has been licensed by Qrypt in order to be integrated into the company’s current encryption platform. The addition of ORNL’s QRNG will…
-
"Security Researchers Found Vulnerabilities at AT&T, T-Mobile, and Sprint That Could Have Exposed Customer Data"Flaws have been discovered in systems used by AT&T, Sprint, and T-Mobile that put customer data at risk of being accessed by attackers. The vulnerabilities discovered by security researchers could allow malicious actors to perform brute-force attacks…
-
"Control System Simulator Helps Operators Learn to Fight Hackers"A control simulator, called the Graphical Realism Framework for Industrial Control Simulations (GRFICS), has been developed to help operators of industrial facilities such as chemical processing plants, water purification plants, and more, build their…
-
"Would You Lock a Password Inside DNA?"A startup company called Carverr is providing a way to enhance the level of security for cryptocurrency passwords that involves the use of synthetic DNA. The service provided by Carverr allows customers to store their cryptocurrency passwords in DNA as…
-
"Iranian Threat Group Targets Universities"An Iranian cyber threat group known as Cobalt Dickens has been linked to the launch of a credentials theft campaign targeting universities. Security researchers at Secureworks discovered a large number of spoofed domains aimed at stealing credentials for…
-
"A New Pacemaker Hack Puts Malware Directly on the Device"Pacemakers and implantable insulin pumps, manufactured by Medtronic, have been discovered by researchers to be vulnerable of being controlled by hackers. Vulnerabilities found in Medtronic's software delivery network can allow hackers to execute…