News
-
"Chinese Cyber Espionage Group Thrip Targeting Satellite Communications, Telecoms and Defense Companies"According to security researchers at Symantec, a China-based cyber espionage group dubbed Thrip has been targeting satellite operators, telecommunications companies, and defense contractors in the US and Southeast Asia. The group has been utilizing…
-
"Mac OS Bug Reveals Encrypted File Info, Claim Researchers"The latest Mac OS has been discovered to contain a security flaw that could allow the contents of encrypted files to be exposed. The bug involves Apple's 'Quick Look' feature. This article continues to discuss the security flaw found in the latest…
-
"Small Businesses Vulnerable to Cyberattacks, Then Don't Act"A survey conducted by Hiscox insurance reveals that the majority of small businesses that faced cyberattacks in 2017 did not take action to improve upon their cybersecurity following the impact of such attacks. The types of cyberattacks experienced by…
-
"Delft Scientists Make First ‘on Demand’ Entanglement Link"Researchers at QuTech in Delft University of Technology have developed a method in which quantum entanglement between two quantum chips can be generated on demand. The advancement further opens up the possibility for the creation of a quantum internet…
-
"Military Colleges Aim to Develop Cyber Programs"Leading military colleges and universities, including The Citadel, the University of North Georgia, Norwich University, Texas A&M, Virginia Military Institute, and Virginia Tech, will be developing cyber programs. The aim of these cyber programs is…
-
"Meltdown-Like 'LazyFP' Vulnerability Impacts Intel CPUs"A new speculative execution side channel vulnerability called LazyFP has been discovered to affect most Intel Core processors. The flaw related to the floating point unit (FPU) could be exploited by attackers to gain unauthorized access to sensitive…
-
"Connected Cars Vulnerable to Cyberthreats"Researchers have further highlighted the vulnerability of connected cars to cyberattacks. The addition of new features and functions to a connected car creates digital security risks and vulnerabilities. This article continues to discuss the…
-
"MysteryBot Android Trojan Aims at Banking Apps"A new type of malware called MysteryBot has been discovered by security researchers at Threat Fabric to be targeting banking applications. According to researchers, MysteryBot launches a banking Trojan, key logger, and ransomware. MysteryBot also…
-
"Researchers Investigate Potential Threat to Speech Privacy via Smartphone Motion Sensors"A study conducted by researchers at the University of Alabama at Birmingham suggests that the security vulnerabilities contained by smartphone motion sensors such as accelerometers and gyroscopes could be exploited by cybercriminals to record a user’s…
-
"DHS Cyber Specialist: Look for Behavior Patterns with APTs"Casey Kahsen, an IT specialist at DHS, emphasizes the importance of looking at human behavior patterns in order to track advanced hacking groups. Examining the human behavior associated with an APT means observing operational hours or coding style. This…
-
"Why 50,000 Ships are so Vulnerable to Cyberattacks"The shipping industry has been behind in considering regulations that address cybersecurity. A recent demonstration performed by cybersecurity experts further shows the inadequate cybersecurity of the shipping industry. This article continues to…
-
"Blockchain All the Rage But Comes With Numerous Risks"McAfee's Advanced Threat Research Team explored four types of vectors that could be used by cybercriminals to attack the blockchain. These attack vectors include phishing, malware, blockchain implementation exploits, and blockchain technology…