News
-
"Increased Ransomware Activity Prompts FBI Warning"The FBI has released a warning pertaining to the launch of ransomware attacks in which malware is installed on a computer system to encrypt files and demand the payment of a ransom in order to decrypt the files. Systems used by government agencies,…
-
“Whoops! Has LifeLock been unlocked?”Massive data breaches are becoming more and more commonplace, and often companies involved in those breaches provide subscriptions to identity theft services for the victims of those breaches, such as LifeLock. Security researcher Nathan Reese came…
-
"Decade-Old Bluetooth Flaw Lets Hackers Steal Data Passing Between Devices"A major flaw in the Bluetooth specification could allow attackers to perform malicious activities such as monitor and interfere with data transmitted wirelessly between vulnerable devices. The exploitation of this vulnerability could expose sensitive…
-
"Flaw Let Researchers Snoop on Swann Smart Security Cameras"Security researchers have discovered vulnerabilities in smart security cameras made by Swann. These vulnerabilities could be exploited by attackers to spy on users via audio and video streams. This article continues to discuss the security flaw in…
-
"New Report Shows Pen Testers Usually Win"A report recently released by Rapid7 Global Consulting explores the practice of penetration testing through the examination of results from 268 client engagements. According to the report, vulnerabilities in software and user credentials are the most…
-
"Dark Web Cyber Crime Markets Thriving"An analysis of the dark web was performed by researchers at Positive Technologies. Researchers examined the tools and services advertised on dark web markets and how much it costs to use them in the launch of cyberattacks. This article continues to…
-
"Security Concerns Around the Rapidly Growing Use of the Industrial Internet of Things"A survey conducted by the SANS Institute highlights security concerns raised by the increasing use of Industrial Internet of Things (IIoT). IIoT refers to physical internet-connected devices used within different critical infrastructure sectors such as…
-
"Using Machine Learning to Detect Software Vulnerabilities"A new vulnerability detection system has been developed by a team of researchers from Draper and Boston University. The system uses machine learning algorithms for the automated detection of software vulnerabilities. Although researchers have focused…
-
“Google Starts Labeling All HTTP Sites as ’Not Secure’”Over the last several years, Google has been pushing for better website security, and as of yesterday, the company has made a huge change with Chrome 68. From now on, any website connected to Google Chrome that is still using HTTP will be flagged with…
-
"World-First Program to Stop Hacking by Quantum Supercomputers"A post-quantum secure algorithm has been created by IT experts at Monash University to prevent attacks launched by quantum supercomputers. The L2RS algorithm is said to be a significant advancement in the preservation of user privacy and security of…
-
"Malware Author 'Anarchy' Builds 18,000-Strong Huawei Router Botnet"A massive botnet composed of 18,000 infected Huawei routers, has been built by an attacker by the name of Anarchy. The botnet was built through the exploitation of a vulnerability in Huawei HG532 routers. This article continues to discuss the…