News
-
"Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues"A team of researchers at Positive Technologies have demonstrated how the exploitation of vulnerabilities within the Signaling System 7 (SS7) protocol could allow malicious actors to perform a number of malicious activities such as gaining access to Gmail…
-
“Don't Rely On an Unlock Pattern To Secure Your Android Phone”Security researchers at the U.S. Naval Academy and the University of Maryland Baltimore County have published a study in which they demonstrate the ease at which a shoulder-surfing snooper could visually detect and recreate an Android unlock pattern. The…
-
“Mobile Ransomware Hits Browsers with Old-School Techniques”Ransomware is expected to increasingly target mobile devices such smartphones and tablets as tools and services for performing such attacks on these devices become more accessible to cybercriminals via the dark web. According to researchers from…
-
“Organizations Worried Tech Skills Gap Will Expose Them to Security Vulnerabilities”A survey conducted by Tripwire emphasizes the problematic cybersecurity skills gap within organizations as an overwhelming majority of respondents believe that the need for technically skilled security staff has grown in the past couple of years.…
-
“AI Slurps, Learns Millions of Passwords to Work out Which Ones You May Use Next”A team of researchers at the Stevens Institute of Technology have released a paper, detailing a method in which they use machine learning systems to predict the passwords that users will use. The technique demonstrated by researchers called “PassGAN”,…
-
“Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks”An attack scenario by the name of “HVACKer” in which heating, ventilation, and air conditioning systems are used to connect air-gapped networks with the external environment has been demonstrated by researchers at Ben-Gurion University of the Negev. This…
-
“DARPA enlists bots to fight social engineering”The Defense Advanced Research Projects Agency (DARPA) aims to improve the automated detection of social engineering attacks with its Active Social Engineering Defense (ASED) program. This program proposes the use of bots in the discovery and…
-
“Security Cameras Are Vulnerable to Attacks Using Infrared Light”Researchers at Ben-Gurion University of Negev (BGU) have demonstrated a method that they have named “aIR-Jumper” in which infrared light is used to covertly communicate with malware installed on a security camera in order to gather leaked sensitive…
-
“Miners on the Rise”Miners are one of the classes of malware that have increasingly been encountered by users recently. Malicious threat actors could collect cryptocurrency by deceiving unsuspecting users into installing mining software on their computer systems. Threat…
-
“No Nuclear Weapon Is Safe from Cyberattacks”Though a nuclear weapons system has not suffered a cyberattack as of yet, security researchers claim that such attacks on this system are far from impossible. The exploitation of any vulnerability within this system by cyberattackers could significantly…
-
“Low-Cost Tools Making Cybercrime More Accessible: SecureWorks”A report released by the security vendor, SecureWorks, says that tools used in the performance of malicious cyber activities are becoming more affordable, thus increasing the accessibility to such tools for cybercriminals. Less-skilled cybercriminals…
-
Winner Annouced for 5th Annual Best Scientific Cybersecurity Paper CompetitionYou Get Where You're Looking For: The Impact of Information Sources on Code Security (Free Open Access Copy) by Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky is the Winner of the 5th Annual Best Scientific…