News
-
"Hackers Designed a 'Master Key' to Unlock Millions of Hotel Room Doors"Security researchers from F-Secure discovered a critical flaw in the design of VingCard’s Vision software used for electronic keys, which would allow millions of hotel rooms to be hacked. An attack developed by researchers, Tomi Tuominen and Timo…
-
"Accelerating Detection of Zero-Day Vulnerabilities"DARPA’s Information Innovation Office (I20) recently announced the Computers and Humans Exploring Software Security (CHESS) program. The CHESS program aims to improve upon the speed and scale at which zero-day vulnerabilities are detected and fixed. This…
-
“Orangeworm Cyber Attack Group Targets Health Sector”Orangeworm is a hacking group discovered by Symantec to be targeting organizations linked to the healthcare industry. According to researchers, the group has been launching a custom backdoor called Trojan.Kwampirs on medical devices and machines used by…
-
"Isolated, Air-Gapped Cypto-Wallets Hacked"Researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev demonstrated a way in which private keys could be siphoned from air-gapped cold wallets, which are offline cryptocurrency wallets used to store bitcoin. The demonstration performed by…
-
"'Gold Galleon' Hackers Target Shipping Industry"The group responsible for the launch of several extensive BEC attacks on the shipping industry has been identified by researchers from Dell SecureWorks Counter Threat Unit. The group called Gold Galleon, exploited the industry's inadequate security in…
-
"Researchers Propose Scheme to Secure Brain Implants"A method has been proposed by researchers from KU Leuven, Belgium, that would strengthen the security of implantable neurostimulators. According to researchers, the communications between the neurostimulator and its external device programmer lacks…
-
"The Public Has a Vital Role to Play in Preventing Future Cyber Attacks"An extensive hacking incident recently occured in which a signifiant number of Australian organizations were affected. The attack highlights the importance of taking on stronger approaches to defending against cyberattacks and educating the…
-
"First Public Demo of Data Breach via IoT Hack Comes to RSAC"A demonstration performed by security researchers at the 2018 RSA Conference shows a way in which novice attackers could compromise an IoT device and steal personally identifiable information. The demonstrated attack could be performed without…
-
“Trustjacking exploit abuses iTunes feature to spy on iOS devices”Symantec researchers at RSA 2018 have disclosed a technique dubbed “Trustjacking”. The technique allows attacker to spy on and gain control of devices via the Wi-fi sync feature in iTunes. This article further discusses Trustjacking, Apple’s response to…
-
“Google’s Project Zero Exposes Unpatched Windows 10 Lockdown Bypass”Researchers at Google’s Project Zero have released information and proof-of-concept for a bypass that affects Windows 10 S and 10 users with user mode code integrity enabled. Microsoft and Google are currently working toward finding a solution. This…
-
“DHS Prepares Cross-Sector Strategy to Limit Domino Effects from Big Cyberattacks”A new cyber strategy will be released by the Department of Homeland Security, which aims to alleviate the domino effects of cyberattacks on critical infrastructure sectors and government agencies. The strategy will also help to improve the security…