News
-
"A Tiny New Chip Could Secure the Next Generation of IoT"Securing IoT devices continues to be a challenge as the use of such inadequately secured devices grows. IoT security researchers at Microsoft Research have placed focus on microcontrollers, which are expected to spark an exponential IoT population growth…
-
“A Popular Virtual Keyboard App Leaks 31 Million Users' Personal Data”Security researchers at the Kromtech Security Center have discovered a major exposure of personal data belonging to over 31 million users of AI.type, which is a popular virtual keyboard app. Leaked data contains full names, email addresses, phone numbers…
-
"Researchers Found a Security Flaw That Had 10 Million Banking App Users at Risk"A new tool developed by researchers from the University of Birmingham to perform semi-automated security testing of mobile phone apps found a critical vulnerability within banking apps. Testing conducted by researchers with the use of this tool has…
-
“Girl Scouts to Train Next Generation of Cybersecurity, AI, and Robotics Professionals”In support of diversifying the STEM workforce, Girl Scouts of the USA and Raytheon have announced the launch of a national computer science program that will offer young girls the opportunity to prepare for careers in the fields of cybersecurity,…
-
“What Is Andromeda? Global Law Enforcement Agencies Take down Botnet Linked to 80 Malware Families”A massive malware botnet by the name of Andromeda has recently been taken down by global law enforcement agencies after being active for several years. Andromeda, also known as Gamarue or Wauchos, was developed in September 2011 in support of the…
-
"100,000-Strong Botnet Built on Router 0-Day Could Strike at Any Time"The latest variant of Mirai malware has been discovered to be using a more sophisticated approach than other versions that have released since the botnet’s source code was openly published. This new strain of Mirai is significant as it can infect two…
-
“Phishing Schemes Are Using Encrypted Sites to Seem Legit”A report sent out on Tuesday by research and defense firm PhishLabs shows that the use of HTTPS by attackers has increased exponentially with the push of website encryption by companies like Google. While the website encryption unnecessary for the…
-
"Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification"Sridhar Muppidi, IBM Security Systems’ chief technology officer for identity and access management solutions, emphasizes the importance of advancement beyond two-factor authentication (2FA) as it not the ultimate solution for the verification of…
-
“CyberX Security Researchers Demonstrate How to Jump the ICS/SCADA Air Gap at Black Hat Europe 2017”Security researchers at CyberX, a leading ICS security vendor, will demonstrate an attack in which Programmable Logic Controllers (PLCs) are targeted in order to jump the industrial control system (ICS) air gap and exfiltrate confidential information.…
-
"Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches"According to Saurabh Harit, researcher at Spirent SecurityLabs, vulnerabilities within devices such as the IV infusion pump and the digital smart pen could lead to an extensive data breach upon exploitation by hackers. Research conducted on the security…
-
"Game Theory Harnessed for Cybersecurity of Large-Scale Nets"Research being led by Purdue University in collaboration with Sandia National Laboratories aims to improve upon the cybersecurity of large-scale systems such as power grids, autonomous military defense networks, industrial control systems, consumer…