News
  • “An IoT Teddy Bear Leaked Millions of Parent and Child Voice Recordings”
    Another toy has been hacked to steal account data of an estimated 800,000 users along with two million message recordings. CloudPets’ toys allow users to exchange audio voice messages. The toy company failed to implement security measures such as a…
  • "Backup Error Exposes 1.37 Billion-Record Spamming Database"
    Security researchers at anti-virus company, MacKeeper, have discovered backup databases that hold about 1.37 million records of names, IP addresses, zip codes, and other personal addresses. These databases were left exposed by marketing company, River…
  • "House Bill would give companies some leeway to hack back"
    A new House Bill would permit companies that are victims of hackers to retaliate through hacking back, under the condition that they do not destroy any of the hackers’ data. This condition is put in place to protect innocent bystanders that may be…
  • "Fileless PowerShell malware uses DNS as covert channel"
    Cyberattacks are becoming increasingly harder to detect as shown by the latest attack, DNSMessenger.  Researchers from Cisco Systems’ Talos team have discovered the DNSMessenger, which is distributed through email phishing tactics and when opened,…
  • "Health Organizations Spending Big on Cybersecurity"
    As healthcare organizations improve upon medical services and digital medical record management through technological innovations, cybersecurity becomes a bigger concern. Healthcare organizations are expected to increase spending on information security…
  • "Infosec white-coats: Robots are riddled with software security bugs"
    IOActive researchers point out the many cybersecurity flaws within multiple home, business, and industrial robots that could easily be exploited by hackers. These vulnerabilities were discovered after in-depth security tests and evaluations of mobile…
  • "This malware tracks your audio by remotely controlling PC microphones"
    CyberX’s research team has discovered new malware that can remotely control PC microphones, allowing hackers to listen in on conversations. Hackers that are launching this new malware are also storing infiltrated data such as screenshots, documents, and…
  • "How The Media Are Using Encryption Tools To Collect Anonymous Tips"
    News organizations such as the Washington Post, NY Times, and ProPublica are taking advantage of end-to-end encryption technology by welcoming the public to send them anonymous tips through several encrypted messaging applications and services. This…
  • "How DHS hopes to harden tech against GPS spoofing"
    The Department of Homeland Security is conducting tests to improve the security of GPS signals as devices and government operations such as smartphones and the military rely on the critical services provided by these signals. DHS Science and Technology…
  • "New Version of Dridex Banking Trojan Uses ‘AtomBombing’ To Infect Systems"
    A new version of the Dridex banking Trojan has been discovered and this time it is being injected through a newly developed technique called AtomBombing. This new code injection technique has already been performed to attack multiple online banking…
  • NSA Talks about Science of Security
    The National Security Agency posted an article on NSA.gov that calls for nominations for the 5th annual paper competition and highlights some of the SoS accomplishments of the past year. Highlights include an accomplishment from each of the lablets, the…
  • “Researchers from Google, CTI Break SHA-1 Hash Encryption Function”
    Security researchers at Google and the CWI Institute have revealed that the Secure Hash Algorithm-1 (SHA-1) cryptographic function is still susceptible to being cracked by hackers. Researchers were able to mathematically generate identical SHA-1 hashes…