News
-
"Study Finds Top Sites Can Be Impersonated Using Non-Latin Alphabet"A study conducted by Farsight Security reveals the use of Internationalized Domain Names (IDNs) to impersonate 125 top brand websites, including Apple, Amazon, Google, Microsoft, Facebook, and many more. IDN homograph attacks use non-Latin alphabets to…
-
"6 Ways Hackers Will Use Machine Learning to Launch Attacks"As artificial intelligence and machine learning are expected to significantly improve upon cybersecurity defenses, hackers are also expected to utilize such technologies in the launch of highly sophisticated cyberattacks. Adversarial machine learning is…
-
"Real-world Intercontinental Quantum Communications Enabled by the Micius Satellite"Intercontinental quantum key distribution (QKD) was successfully demonstrated through the use of a satellite by the name of Micius, which was developed by a team of scientists from the Chinese Academy of Sciences. An experiment conducted by scientists…
-
"How Threat Hunting Enhances Cybersecurity"As the frequency of cyberattacks continues to grow at a significant rate, organizations should take a proactive approach to protect their networks against such attacks. Threat hunting is a way in which organizations could proactively secure their…
-
"One-Quarter of Ethical Hackers Don't Bother Reporting Bugs Due to Lack of Disclosure Policies"HackerOne conducted a survey to which 1,698 members of the ethical hacking community responded. One-quarter of the ethical hackers that responded to the survey reveal that they do not report discovered vulnerabilities as affected companies lack…
-
“Meltdown-Spectre: Intel says newer chips also hit by unwanted reboots after patch”Intel released an update on the effects of its Meltdown-Spectre patches for newer CPUs on Wednesday, stating that some the patches cause the same unwanted and more frequent reboots as they do for the older CPUs. Following this, Intel has also…
-
“Pentagon Considers Nuclear Response to Retaliate for Large Cyber Attacks”The draft document of the Pentagon’s 2018 Nuclear Posture Review says that the U.S. would consider the use of nuclear weapons in defense against extreme non-nuclear strategic attacks. According to government officials, major cyberattacks against the U.S…
-
“New Cybersecurity Legislation to Penalize Companies for Data Breaches”A new cybersecurity legislation was recently proposed by two U.S. senators Elizabeth Warren (D-Mass.) and Mark Warner (D-Va.). The Data Breach Prevention and Compensation Act would empower the Federal Trade Commission (FTC) to inflict penalties on credit…
-
“New Method to Detect Illicit Drone Filming Developed”A study published by cybersecurity researchers at Ben-Gurion University of the Negev (BGU) and Weizmann Institute of Science reveals a new method that could be used to detect whether a targeted subject or house is being captured on video via a drone…
-
“84 Percent of U.S. Healthcare Providers Have No Cyber Security Leader”A survey conducted by Black Book Research to which 323 strategic decision makers at U.S. healthcare provider and payer organizations responded, reveal that a majority of U.S. healthcare providers do not have a cyber security officer in place. Having a…
-
“Intel AMT Security Issue: Attackers May Bypass Login Credentials in Corporate Laptops”A security issue within Intel’s Active Management Technology (AMT) was reported by researchers at F-Secure. Through the exploitation of this security issue, attackers with physical access to laptops could place backdoors on the devices within thirty…
-
"What Is Mirai Okiru? New Botnet Found Targeting Billions of ARC-Based IoT Devices Worldwide"A new variant of the notorious Mirai botnet has been discovered by security researchers. The variant named Okiru, targets IoT devices using ARC-embedded processors, which include automobiles, televisions, cameras, and more. According to security…