News
-
"This Smartphone Fingerprint Sensor Checks Your Temperature for Extra Security"Scientists from the Samsung Display-UNIST Center at the Ulsan National Institute of Science and Technology in South Korea have developed a smartphone fingerprint sensor. The sensor enhances security by measuring skin temperature to detect the use of an…
-
"Security Gaps in LTE Mobile Telephony Standard"Security experts discovered that the security gaps in the LTE mobile telephony standard could allow attackers to perform malicious activities such as identifying which websites are visited by a user and rerouting users to fraudulent websites. These…
-
"Ransomware: Not Dead, Just Getting a Lot Sneakier"There has been a decline in the launch of ransomware attacks due to the rise in cryptocurrency mining malware and the performance of cryptojacking. However, ransomware continues to be an ongoing threat as indicated by a recent attack faced by the city of…
-
"Major Attack ‘Rampage’ Puts Android Devices at Risk"Researchers have developed an attack that poses a significant threat to the security of Android devices as it could allow hackers to gain administrative control over such devices, steal passwords, and more. The attack dubbed RAMpage, exploits the…
-
"Botnets Evolving to Mobile Devices"Distil Networks conducted a report called “Mobile Bots: The Next Evolution of Bad Bots”. The report draws attention to the increased use of mobile devices in the launch of botnet attacks. This article continues to discuss the significant volume of mobile…
-
"The Benefits of Mature Cloud Security Strategies"A report conducted by the Enterprise Strategy Group highlights the benefits provided by the use of a more practical approach to cloud security. These benefits include the improvement of financial performance and productivity. This article continues to…
-
"Cyber Criminals 'Infect and Collect' in Cryptojacking Surge"Recent cyber threat reports released by McAfee reveal a significant rise in cryptojacking in the first quarter of 2018. Cryptojacking is known as the unauthorized mining of cryptocurrency. This article continues to discuss the increased performance of…
-
"EU Set for New Cyber-Response Force"EU member states have declared their support for the development of an international cyber-response force proposed by Lithuania. The countries in support of this initiative include Romania, Croatia, Spain, and more. This article continues to discuss…
-
"Researchers Warn of New Hyper-Threading-Based Intel CPU Vulnerability"Another major flaw has been discovered to be contained by Intel processors. The critical flaw dubbed TLBleed can be exploited by attackers via the Hyper-Threading technology of Intel CPUs. According to researchers, the exploitation of this flaw can allow…
-
"Five Ways GDPR Could Limit Security Research"EU's General Data Protection Regulation (GDPR) is expected to significantly impact the ways in which security research is conducted. The tools used by researchers to track malicious actors have already been impacted by the new privacy rules. This article…
-
"Hotels, Airlines and Travel Sites Battle Bot Attacks"Research conducted by Akamai reveals that sites of organizations within the hospitality and travel industry are being largely targeted by botnet attacks, which attempt to breach accounts. A significant number of these attacks have also been…
-
"City-Crippling Ransomware, Crypto Hijackings, and More: 2018 Mid-Year Cybersecurity Update"Martin Giles of MIT Technology Review revisits the predictions made earlier this year in regards to the biggest cyberthreats that would be faced in 2018 and gives an update on those threats. The predictions surrounding the increase of data breaches,…