News
-
"Police Figures Cite Cybercrime, Digital Data As Top Concern"Cybercrime has been cited as a top concern for police since most crimes now involve a digital element. The significant increase of digital data is raising concerns among police figures as more data further complicates the policing of cybercrime. This…
-
"US Government Probes Airplane Vulnerabilities, Says Airline Hack Is ‘Only a Matter of Time’"Presentations and risk assessments conducted by US government researchers reveal that an airline will eventually face a cybersecurity breach. Research surrounding the cyber vulnerabilities contained by a commercial aircraft highlights the lack of…
-
"Another Baby Monitor Camera Hacked"A FREDI wireless baby camera monitor was hacked in order to spy on a South Carolina mother and her infant. The incident emphasizes the lack of security implemented in the design and development of IoT devices, as well as the absence of security standards…
-
"Mirai Variants Continue to Spawn in Vulnerable IoT Ecosystem"Variants of the infamous Mirai IoT botnet have continued to emerge following the release of the botnet’s source code in 2016. Netscout's Arbor Security Engineering and Response Team (ASERT) conducted research on current Mirai variants, including Satori,…
-
"Auth0 Subdomain Flaw Puts Users at Risk"Security researcher Daniel Svartman of Imperva discovered a flaw in the subdomain naming system in Auth0, an identity-as-a-service that provides subdomain names for approximately 2000 customers. The flaw allows an attacker to use the same subdomain name…
-
"SS7 Routing-Protocol Breach of US Cellular Carrier Exposed Customer"DHS has recently warned of the tracking of US phone users by hackers through the abuse of the routing protocol known as Signaling System No. 7 (SS7). The exploitation of SS7 could allow hackers to track the geographical location of a user as well as…
-
"In War Against Botnets, Manufacturers Need to Step Up, Report Says"A new cyber report released by the Department of Commerce and Department of Homeland Security (DHS) emphasizes the importance of implementing stronger security into products during the development stage in order to mitigate the problem of botnets. The…
-
"To Pay Hackers’ Ransom Demands or to Invest in More Security?"NTT Security recently published its annual global Risk:Value Report to which 1,800 C-level executives and other decision makers from non-IT functions in different countries and industry sectors responded. According to the report, a third of global…
-
"Quantum Computers and the Unbreakable Lattice"Quantum computers are expected to render currently used encryption algorithms obsolete in the future. However, lattice cryptography has been proposed as an encryption method that can resist quantum computer attacks. This article continues to discuss…
-
"Face, Iris and Pulse Biometrics Close in on Fingerprint Tech"According to a market data report released by ABI Research called Biometric Technologies and Applications, biometric authentication systems based on face, iris, and pulse are expected to lower the market share of fingerprint technologies. Biometrics…
-
"AI Researchers Design 'Privacy Filter' for Your Photos"As the facial recognition technologies used by social networking platforms continue to evolve, concerns surrounding the personal privacy of users and security of data grow. AI researchers at the University of Toronto Engineering have developed an…
-
"Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System"65 security vulnerabilities have been found in the Defense Travel System (DTS). These vulnerabilities were discovered by white-hat hackers participating in the Pentagon's Hack the Defense Travel System program. This article continues to discuss…