News
-
"IoT Poses New Cybersecurity Threats for Cable"The increase in cyberattacks has raised major concerns among TV distributors that provide internet access to consumers. Inadequately secured IoT devices pose a threat to the security of cable. This article continues to discuss concerns and efforts…
-
"NHS Data Breach Caused Details of 150,000 Patients to Be Shared"The National Health Service (NHS) faced a data breach, which affected 150,000 patients. The breach occurred because of a coding error contained by software called SystmOne. This article continues to discuss the data breach and actions taken by NHS…
-
"Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems"A team of researchers from Virginia Tech, University of Electronic Science and Technology of China, and Microsoft Research demonstrated the successful execution of a GPS spoofing attack on road navigation systems. The GPS spoofing attack allowed…
-
"Faster Photons Could Enable Total Data Security"An advancement in quantum physics has been made by a team of researchers at the University of Sheffield, which could significantly improve upon the security of data transfer. The method developed by researchers uses the Purcell Effect to rapidly generate…
-
"The Costs of Data Breaches"A report conducted by Ponemon Institute and sponsored by IBM Security brings attention to the rising global average cost of a data breach. According to the report, the global average cost of a data breach has risen to $3.86 million. This article…
-
"Team Finds Many of Mobile Applications Are Open to Web API Hijacking"An analysis conducted by a team of researchers at Texas A&M University revealed that a significant number of mobile apps are vulnerable to web API hijacking, which poses a threat to the privacy and security of users. Therefore, a system called…
-
“UMBC joining forces with Japan, London to research cyber security”In a new international project, researchers from UMBC will work together with researchers from colleges in London and Japan. The researchers will look at key cybersecurity issues commonly affecting consumers across all three member regions. This article…
-
"Not All Hacks Are Created Equal"The 2018 Hacker-Powered Security Report released by HackerOne highlights the prevalence of different kinds of attacks and vulnerabilities faced by different industries. According to the report, cross-site scripting (XSS) is the most common type of…
-
"Intel Discloses New Spectre Flaws"New variants of the Spectre speculative execution vulnerability have recently been disclosed by Intel. Security researchers by the names of Vladimir Kiriansky and Carl Waldspurger discovered the new Spectre variants and provided details pertaining to…
-
"Researcher Blogged About Workaround for Apple OS Update's USB Restricted Mode"A forensics expert, Oleg Afonin, found a way to circumvent the USB Restricted Mode security feature enabled by Apple’s iOS 11.4.1 update. USB Restricted Mode was designed to protect a user’s iPhone, iPad, or iPod Touch against passcode-cracking USB…
-
"U.S. Air Force Drone Documents Found for Sale on the Dark Web for $200"Sensitive documents pertaining to the U.S. military’s MQ-9 Reaper drone were found being sold by a hacker on the dark web for $200. Research conducted by Recorded Future’s Insikt Group revealed that the hacker was able to obtain such documents through an…
-
"Major International Airport System Access Sold for $10 on Dark Web"A team of researchers at McAfee recently discovered remote desktop protocol (RDP) access to a major international airport’s security system being sold at a low price of $10 on the dark web. RDP access can allow attackers to use targeted systems to…