News
-
“Google Reveals Critical Flaws In Dnsmasq Software Packages”Google security researchers have discovered seven different critical security vulnerabilities within the Dnsmasq software package, which largely impacts millions of Android phones, home routers, desktops, and other IoT devices. Dnsmasq is an open-source…
-
“DHS Cyberinsurance Research Could Improve Security”The Department of Homeland Security (DHS) is conducting research to discover the potential improvements of cybersecurity that would be provided by cyberinsurance. Research is being performed through the collection of breach data into DHS’s Cyber Incident…
-
"5 IT Practices That Put Enterprises at Risk"Although there is no single solution or method to completely safeguard organizations from cyberthreats as such threats continue to grow in sophistication, there are five IT practices that companies could avoid in order to improve upon their security…
-
“Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks”Findings of a study conducted by Dimensional Research and released by One Identity indicate significant inadequacies in the management of user accounts by organizations, which pose great risks to security and compliance. The survey reveals the…
-
“New Research Details the Privacy Implications of Email Tracking”A study conducted by researchers at Princeton University highlights the extensiveness of email tracking and how this form of snooping could significantly impact the privacy of users. According to researchers, most emails are embedded with third…
-
"AI Now Detects the Majority of New Malware on Android"There has been a significant increase in the detection of new malware on Android devices through the utilization of machine learning by Google. The implementation of machine learning into Google Play Protect, an automated application security software…
-
“How Attackers Can Take Advantage of Encrypted Tunnels”As indicated by a survey conducted by Venafi, many organizations often neglect to examine encrypted traffic within their networks. As the encryption of traffic by organizations as well as the use of machine identities increases, the risk of…
-
"Strengthening the Cybersecurity of the Grid"The enhanced connectivity that accompanies the continued modernization of the U.S. electricity grid ignites concerns as advancements in computing and communications technologies for grid operators and consumers are expected to increase the possibility of…
-
"Major Strain of Mac Ransomware Discovered"Researchers at Duo Security have discovered a new strain of ransomware, which targets Mac users as it attacks the firmware of Apple Mac computers. Analyses of 73,000 Mac computer systems have revealed the lack of security updates being received by the…
-
"Phishers Use Private Banking Messages to Lure Victims"This article contains information about a phishing campaign spotted by security vendor Barracuda Networks that uses a variety of legitimate looking emails to impersonate banks such as Bank of America and TD Commercial Banking. Briefly highlighted is the…
-
"Mobile Stock Trading Apps Riddled with Security Holes"Senior security consultant at IOActive, Alejandro Hernandez, has discovered a number of vulnerabilities during the examination of 21 popular mobile stock trading applications. The exploitation of these vulnerabilities can allow hackers to perform…
-
“Facebook-Hijacking Faceliker Malware Is on the Rise”Researchers have observed a significant increase in the activity of Faceliker, which is a strain of Trojan malware that performs a click fraud scheme via the manipulation of users’ Facebook accounts. Though Faceliker has been active since 2013, there has…