-
"Researchers Propose New Method for Secure, Speech-Based Two-Factor Authentication"A new two-factor authentication (2FA) method has been developed by researchers from the University of Alabama at Birmingham. The method, called “Listening-Watch”, minimizes the amount of interaction usually required in the process of 2FA and provides…
-
The Untold Story of NotPetya, the Most Devastating Cyberattack in History -- WiredInteresting article in Wired that goes into the story of NotPetya. This was an amazing impactful malware. See more in the article: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
-
"DDoS Attack Volume Rose 50% in Q2 2018"Although there has been a decrease in the number of DDoS attacks, the volume of such attacks has increased. According to a new report released by Link11, DDoS attack volumes have risen to an average 3.3 Gbps during the second quarter of 2018. This…
-
"This New Ransomware Campaign Targets Business and Demands a Massive Bitcoin Ransom"New ransomware called Ryuk, which is believed to be linked to the North Korean hacking group known as Lazarus, has been demanding that targeted organizations pay ransoms with Bitcoin in order to recover encrypted files. The threat actors behind Ryuk has…
-
"Networking Vendors Patch Against New Cryptographic Attack"Researchers have found a vulnerability in the implementations of IPSec IKE used in networking devices manufactured by Cisco, Huawei, ZyXel, and Clavister. According to researchers, this vulnerability can allow attackers to perform activities such as…
-
Cyber Scene #24 - Spectrum Analysis: PRIVACY---------------?---------------SECURITYCyber Scene #24 SPECTRUM ANALYSIS: PRIVACY---------------?---------------SECURITY SIRI-OUSLY, THE EYES (VICE JULY CYBER SCENE EARS) ALSO HAVE IT NOW
-
"Vulnerability Could Allow Insider to Bypass CEO's Multi-Factor Authentication"Okta researcher, Andrew Lee, found a vulnerability in Microsoft's Active Directory Federation Services (ADFS). ADFS is a feature that allows organizations to implement multi-factor authentication for enhanced security. The exploitation of the…
-
"Adblocking and Browser Privacy Can Be Bypassed, Researchers Find"A new study conducted by researchers from the Catholic University in Leuven reveals that it is possible to evade the privacy and security protections offered by desktop browsers and adblockers. According to researchers, these protections could be…
-
"Hack Mobile Point-of-Sale Systems? Researchers Count the Ways"Security researchers from Positive Technologies have shared research findings surrounding the security of mobile point-of-sale (mPOS) systems. Researchers have found that mPOS readers provided by vendors, including Square, SumUp, PayPal and iZettle,…
-
"There is a Massive Hole in IoT Security, Says Avast Researcher"Avast security researcher, Martin Horn, further highlights the insecurity of IoT devices through the discovery of a new major security hole. According to Horn, smart homes are vulnerable to being hacked through the abuse of misconfigured Message…
-
"More Efficient Security for Cloud-Based Machine Learning"MIT researchers have created a new system to strengthen the security of sensitive data used in online neural networks without compromising the speed at which these networks operate. The system, called GAZELLE, combines two encryption techniques…
-
"IBM’s Proof-of-Concept Malware Uses AI for Spear Phishing"The increasing use of artificial intelligence (AI) in the defense against cyber threats is expected to be accompanied by the growing development of attack tools that weaponize AI. IBM has developed proof-of-concept malware called DeepLocker, which uses…
News