News
-
“Identity Theft, the Not So Hidden Scourge”According to a recent study conducted and released by Javelin Strategy & Research, a record high of 15.4 million U.S. victims were targets of identity fraud in 2016. However, these findings pertaining to incidents of identity fraud are not surprising…
-
"Importance of AI, data in law enforcement suggests growing tension with privacy"Data is being generated more than ever due to the significant growth of online connectivity, therefore technologies such as artificial intelligence (AI) and machine learning are becoming more important in assisting law enforcement in the…
-
"This Dark Web Site Creates Robocalls to Steal People’s Credit Card PINs"Security researchers have discovered a new service that is being offered in the dark web, which can be used by cybercriminals to deceive victims into revealing their credit card pins. Stolen credit card and debit card numbers are often exchanged within…
-
"Encryption system hides your travel data from Uber"With the creation of apps by Uber and its competitors for the support of peer-to-peer transportation, online platforms have been developed to collect users’ personal data. As the number of users on these platforms continue to grow, so does the…
-
"SQL injection vulnerability found in popular WordPpress plug in, again"Researchers at Sucuri have discovered a SQL injection vulnerability within the WordPress plugin, WordPress Statistics, whilst performing a security assessment on popular open source products. The vulnerability arises with the injection of WordPress…
-
"Adaptive cyber security decision support to prevent cyber attacks"The University of Nottingham is leading the development of a new system, which will be in support of organizations in the maintenance of sufficient cybersecurity levels. The digital ‘Online Cyber Security System’ decision support service (OCYSS) is the…
-
"8 Things Every Security Pro Should Know About GDPR"The European Union’s General Data Protection Regulation (GDPR) will be executed on May 25, 2018, therefore any organizations or entities that handle personal data belonging to EU residents must be prepared to fully comply with the rules of this decree.…
-
"Magic Wormhole: Enthusiast develops super-secure way to transmit files from one PC to another"A group of software developers and cybersecurity buffs have developed a new technique of transferring files between computers that eliminates the need for any intermediate tool such as a USB memory stick, portable hard drive, email, or other third-party…
-
"How blockchain-based apps and sites resist DDoS attacks"Distributed Denial-of-Service (DDoS) attacks are expected to increase in frequency and sophistication, especially with the growing use of interconnected and unsecure IoT devices. The largest DDoS attack on record, targeted security news site,…
-
"Researchers Claim Petya Outbreak Was Disguised Wiper Attack"According to researchers, Matt Suiche of Comae Technologies and Juan Andres Guerrero-Saade of Kaspersky Lab, the Petya attack may actually be a “wiper” malware masquerading as ransomware. This assessment changes the intent of the attack as a wiper…
-
"Researchers demonstrate new firewall that protects cellphones from security threat"Security researchers at Ben-Gurion University of the Negev have introduced a new firewall, which serves to detect malicious code and deliver a level of security that has been absent from Android cellphones. Research behind the development of this…
-
"Even weak hackers can pull off a password reset MITM attack via account registration"Researchers from the College of Management Academic Studies have shared their findings of a new technique in which an attacker could perform a password man-in-the-middle attack with the exploitation of password reset procedure vulnerabilities during the…