News
-
"GandCrab Ransomware Crooks Take Agile Development Approach"Cybercriminals behind the launch of GandCrab ransomware, which has infected more than 50,000 victims have adopted an agile development approach for the evolution of this malware. An assessment conducted by Check Point of the different versions of…
-
"Cryptojacking Threat Continues to Rise"The threat of cryptojacking, also known as the unauthorized mining of cryptocurrency, continues to grow. According to Secureworks, the value of the cryptocurrency market has grown significantly in conjunction with the rise of crypto-mining malware in…
-
"Air Gapping PCs Won't Stop Data Sharing Thanks to Sneaky Speakers"A study conducted by researchers at Ben-Gurion University of the Negev reveals that sound output devices such as computer speakers, headphones, earbuds, and more could be used to extract and send data between air-gapped computers. The new method called…
-
"AMD Allegedly Has Its Own Spectre-Like Security Flaws"Security researchers at CTS-Labs claim to have discovered 13 critical security flaws contained by AMD’s Ryzen and EPYC processors. According to the researchers, the exploitation of vulnerabilities found within AMD’s Ryzen and EPYC chips would allow…
-
"Off-The-Shelf Smart Devices Found Easy to Hack"Cyber researchers at Ben-Gurion University of the Negev discovered major security vulnerabilities within off-the-shelf IoT devices such as baby monitors, thermostats, security cameras, and more through the dismantling and reverse engineering of such…
-
"LTE Security Flaws Could Be Used for Spying, Spreading Chaos"Researchers at Purdue University and the University of Iowa discovered 10 new types of attacks upon assessment of their proof-of-concept penetration testing toolset by the name of LTEInspector on 4G LTE networks. The security flaws discovered to be…
-
"Cyber Espionage Campaign ‘Slingshot’ Targets Victims Via Routers"Security researchers have discovered a new cyber-espionage threat called Slingshot in which MikroTik routers were used to infect the computers of around 100 victims in the Middle East and Africa. The routers targeted by the Slingshot APT were used to…
-
"How Creative DDOS Attacks Still Slip Past Defenses"DDoS attacks in which a targeted system is flooded with traffic in order to disrupt operations and availability of services, continues to grow in volume and creativity. The many different variations and elements of DDoS attacks pose a significant…
-
"These Popular Robots Are Defenseless Against Cyberattacks"Security researchers at IOActive have demonstrated that it is possible to infect robots with ransomware. Two robots developed by SoftBank named Pepper and Nao can be hacked through the exploitation of unprotected modules within their functions. This…
-
“Mac Malware More Than Doubled in 2017”Security firm, Malwarebytes, warns of the rise of malware targeting Apple Mac computers. The detection of such malware has increased significantly from 2016 to 2017, with new Mac threats emerging in 2018. This article continues to discuss the increased…
-
“Combining Old and New to Create a Novel Power Grid Cybersecurity Tool”A R&D project led by Berkeley Lab researchers aims to improve upon the protection of the electric power grid in the event of a cyberattack. The project incorporates cybersecurity, machine learning algorithms, and power system sensor devices to…