News
-
"Security Gaps Identified in Internet Protocol 'IPSec'"The Internet protocol, IPSec, has been revealed by researchers to be vulnerable to attacks. The vulnerability of IPSec is due to the insecurity of the Internet Key Exchange protocol, IKEv1, which is still being used in operating systems and newer…
-
"Password Managers Vulnerable to Insider Hacking"A team of researchers from Aalto University and the University of Helsinki have found security vulnerabilities in popular password managers used to store login credentials. The inadequate security of the inter-process communication (IPC) channel used by…
-
"Intel CPUs Afflicted with Fresh Speculative Execution Flaws"Researchers have discovered a new set of speculative execution vulnerabilities in Intel processors, called L1 Terminal Fault (L1TF) flaws. The three new vulnerabilities affect Intel's Software Guard Extensions (SGX) technology, System…
-
"Hackers Can Seize Practically All Your Online Accounts, and It's Your Voicemail's Fault"Security researcher, Martin Vigo, has demonstrated the use of voicemail to take control of an individual's online accounts including PayPal, WhatsApp, Apple, and more. Through the use of voicemail, Vigo was able to reset passwords for online accounts.…
-
"Your Smart Air Conditioner Could Help Bring down the Power Grid"A new study done by researchers at Princeton University brings attention to the possible use of connected home appliances such as air conditioners and waters by hackers in the disruption of the power grid. According to researchers, these high wattage…
-
"NSA Research Looks at How Stress Impacts Cyber-Security Operations"The National Security Agency (NSA) presented details at Black Hat USA pertaining to research on how stress affects cybersecurity operations. According to the study conducted by the NSA, as a tactical cyber-operator experiences more frustration, their…
-
"Security Researchers Found a Way to Hack into the Amazon Echo"Tencent security researchers, HuiYu and Qian Wenxiang, demonstrated an attack method that could be used by hackers to listen in on unsuspecting users of Amazon Echo speakers. The technique uses a modified Echo speaker. This article continues to discuss…
-
"Researchers Showed Remote Style Hack for New Macs"Researchers have discovered the possibility of remotely hacking a new Apple Mac computer during the process of setting it up. According to researchers, this attack is possible through the exploitation of a bug contained by Apple's Device Enrollment…
-
"Hacked Satellite Could Launch Microwave-Like Attacks"Security researcher, Ruben Santamarta, from IOActive has revealed the discovery of flaws in several popular satellite communication systems used by ships, planes, and the military. These vulnerabilities could be exploited by hackers to perform cyber-…
-
"Manufacturing Industry Experiencing Higher Incidence of Cyberattacks"A new report released by threat hunting firm, Vectra, highlights the increased number of cyberattacks faced by manufacturing companies. The growing connectivity of the manufacturing industry greatly contributes to the increase in cyberattacks experienced…
-
"Flagship Election Security Bill Gets a Companion in the House"A companion election security bill has recently been introduced by a bipartisan group of House Intelligence Committee members. The House bill named the Secure Elections Act is aimed at helping state governments strengthen their election security as well…
-
"New Bugs Leave Millions of Phones Vulnerable to Hackers"Research conducted by Kryptowire, which was funded by the Department of Homeland Security, reveals the presence of major security vulnerabilities in many phones sold by Verizon, AT&T, T-Mobile, Sprint, and other U.S. cell phone carriers. The…