News
-
"Hacking Smart Plugs to Enter Business Networks"A buffer overflow flaw has been discovered in Belkin’s Wemo Insight Smart Plug by researchers at McAfee. A smart plug enables whatever is plugged into it to be remotely switched on or off via an app. The vulnerability found in the Wemo smart plug could…
-
"Security Flaws in Police Body Cameras Open the Devices to Attack"A number of security vulnerabilities have been discovered in body cameras used by the police. An analysis of bodycams from Vievu, Patrol Eyes, Fire Cam, Digital Ally, and CeeSc, reveals the presence of vulnerabilities that can allow attackers to perform…
-
"Pushing Cybersecurity for Counties"In support of strengthening the cybersecurity of counties, the National Association of Counties and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are collaborating in the encouragement of counties to join MS-ISAC’s cybersecurity…
-
"A Monitor’s Ultrasonic Sounds Can Reveal What’s on the Screen"A team of researchers have presented an acoustic side-channel attack that could be used by hackers to gain information pertaining to what is being displayed on a computer monitor. The attack can be performed by analyzing the ultrasonic sounds produced by…
-
"It Takes an Average 38 Days to Patch a Vulnerability"A new report published by TCell reveals findings of an examination of over 316 million security incidents, which highlight trends surrounding web application attacks. According to the report, the top five most common types of attacks on web…
-
"Hackers Target Smartphones to Mine Cryptocurrencies"Cryptojacking is a cyberattack in which the processing power of a computing device is hijacked to perform cryptocurrency mining. The targeting of smartphones by hackers to perform cryptojacking is increasing as indicated by recent discoveries of mobile…
-
"Researchers Propose New Method for Secure, Speech-Based Two-Factor Authentication"A new two-factor authentication (2FA) method has been developed by researchers from the University of Alabama at Birmingham. The method, called “Listening-Watch”, minimizes the amount of interaction usually required in the process of 2FA and provides…
-
The Untold Story of NotPetya, the Most Devastating Cyberattack in History -- WiredInteresting article in Wired that goes into the story of NotPetya. This was an amazing impactful malware. See more in the article: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
-
"DDoS Attack Volume Rose 50% in Q2 2018"Although there has been a decrease in the number of DDoS attacks, the volume of such attacks has increased. According to a new report released by Link11, DDoS attack volumes have risen to an average 3.3 Gbps during the second quarter of 2018. This…
-
"This New Ransomware Campaign Targets Business and Demands a Massive Bitcoin Ransom"New ransomware called Ryuk, which is believed to be linked to the North Korean hacking group known as Lazarus, has been demanding that targeted organizations pay ransoms with Bitcoin in order to recover encrypted files. The threat actors behind Ryuk has…
-
"Networking Vendors Patch Against New Cryptographic Attack"Researchers have found a vulnerability in the implementations of IPSec IKE used in networking devices manufactured by Cisco, Huawei, ZyXel, and Clavister. According to researchers, this vulnerability can allow attackers to perform activities such as…