News
-
Cyber Scene #24 - Spectrum Analysis: PRIVACY---------------?---------------SECURITYCyber Scene #24 SPECTRUM ANALYSIS: PRIVACY---------------?---------------SECURITY SIRI-OUSLY, THE EYES (VICE JULY CYBER SCENE EARS) ALSO HAVE IT NOW
-
"Vulnerability Could Allow Insider to Bypass CEO's Multi-Factor Authentication"Okta researcher, Andrew Lee, found a vulnerability in Microsoft's Active Directory Federation Services (ADFS). ADFS is a feature that allows organizations to implement multi-factor authentication for enhanced security. The exploitation of the…
-
"Adblocking and Browser Privacy Can Be Bypassed, Researchers Find"A new study conducted by researchers from the Catholic University in Leuven reveals that it is possible to evade the privacy and security protections offered by desktop browsers and adblockers. According to researchers, these protections could be…
-
"Hack Mobile Point-of-Sale Systems? Researchers Count the Ways"Security researchers from Positive Technologies have shared research findings surrounding the security of mobile point-of-sale (mPOS) systems. Researchers have found that mPOS readers provided by vendors, including Square, SumUp, PayPal and iZettle,…
-
"There is a Massive Hole in IoT Security, Says Avast Researcher"Avast security researcher, Martin Horn, further highlights the insecurity of IoT devices through the discovery of a new major security hole. According to Horn, smart homes are vulnerable to being hacked through the abuse of misconfigured Message…
-
"More Efficient Security for Cloud-Based Machine Learning"MIT researchers have created a new system to strengthen the security of sensitive data used in online neural networks without compromising the speed at which these networks operate. The system, called GAZELLE, combines two encryption techniques…
-
"IBM’s Proof-of-Concept Malware Uses AI for Spear Phishing"The increasing use of artificial intelligence (AI) in the defense against cyber threats is expected to be accompanied by the growing development of attack tools that weaponize AI. IBM has developed proof-of-concept malware called DeepLocker, which uses…
-
"Web Security Gets a Boost as TLS Gets Major Overhaul"The Internet Engineering Task Force (IETF) has recently published the finalized version of Transport Layer Security (TLS) version 1.3. TLS 1.3 ( RFC 8446 ) improves upon the speed, performance, and security of web communications. This article continues…
-
"Security Gaps Identified in Internet Protocol 'IPSec'"The Internet protocol, IPSec, has been revealed by researchers to be vulnerable to attacks. The vulnerability of IPSec is due to the insecurity of the Internet Key Exchange protocol, IKEv1, which is still being used in operating systems and newer…
-
"Password Managers Vulnerable to Insider Hacking"A team of researchers from Aalto University and the University of Helsinki have found security vulnerabilities in popular password managers used to store login credentials. The inadequate security of the inter-process communication (IPC) channel used by…
-
"Intel CPUs Afflicted with Fresh Speculative Execution Flaws"Researchers have discovered a new set of speculative execution vulnerabilities in Intel processors, called L1 Terminal Fault (L1TF) flaws. The three new vulnerabilities affect Intel's Software Guard Extensions (SGX) technology, System…
-
"Hackers Can Seize Practically All Your Online Accounts, and It's Your Voicemail's Fault"Security researcher, Martin Vigo, has demonstrated the use of voicemail to take control of an individual's online accounts including PayPal, WhatsApp, Apple, and more. Through the use of voicemail, Vigo was able to reset passwords for online accounts.…