News
-
"UN finds cybersecurity is a struggle worldwide"As indicated by the Global Cybersecurity Index (GCI), recently published by the International Telecommunication Union (ITU), there is much need for a global upgrade on cybersecurity. As revealed by the survey of 134 countries, Singapore was rated the “…
-
"Libgcrypt ‘Sliding Right’ Attack Allows Recovery of RSA-1024 Keys"In an academic paper titled, “Sliding right into disaster: Left-to-right sliding windows leak”, researchers have shared their discovery of how the cryptographic library, Libgcrypt, is susceptible to a local side-channel attack. It has been revealed that…
-
“Identity Theft, the Not So Hidden Scourge”According to a recent study conducted and released by Javelin Strategy & Research, a record high of 15.4 million U.S. victims were targets of identity fraud in 2016. However, these findings pertaining to incidents of identity fraud are not surprising…
-
"Importance of AI, data in law enforcement suggests growing tension with privacy"Data is being generated more than ever due to the significant growth of online connectivity, therefore technologies such as artificial intelligence (AI) and machine learning are becoming more important in assisting law enforcement in the…
-
"This Dark Web Site Creates Robocalls to Steal People’s Credit Card PINs"Security researchers have discovered a new service that is being offered in the dark web, which can be used by cybercriminals to deceive victims into revealing their credit card pins. Stolen credit card and debit card numbers are often exchanged within…
-
"Encryption system hides your travel data from Uber"With the creation of apps by Uber and its competitors for the support of peer-to-peer transportation, online platforms have been developed to collect users’ personal data. As the number of users on these platforms continue to grow, so does the…
-
"SQL injection vulnerability found in popular WordPpress plug in, again"Researchers at Sucuri have discovered a SQL injection vulnerability within the WordPress plugin, WordPress Statistics, whilst performing a security assessment on popular open source products. The vulnerability arises with the injection of WordPress…
-
"Adaptive cyber security decision support to prevent cyber attacks"The University of Nottingham is leading the development of a new system, which will be in support of organizations in the maintenance of sufficient cybersecurity levels. The digital ‘Online Cyber Security System’ decision support service (OCYSS) is the…
-
"8 Things Every Security Pro Should Know About GDPR"The European Union’s General Data Protection Regulation (GDPR) will be executed on May 25, 2018, therefore any organizations or entities that handle personal data belonging to EU residents must be prepared to fully comply with the rules of this decree.…
-
"Magic Wormhole: Enthusiast develops super-secure way to transmit files from one PC to another"A group of software developers and cybersecurity buffs have developed a new technique of transferring files between computers that eliminates the need for any intermediate tool such as a USB memory stick, portable hard drive, email, or other third-party…
-
"How blockchain-based apps and sites resist DDoS attacks"Distributed Denial-of-Service (DDoS) attacks are expected to increase in frequency and sophistication, especially with the growing use of interconnected and unsecure IoT devices. The largest DDoS attack on record, targeted security news site,…
-
"Researchers Claim Petya Outbreak Was Disguised Wiper Attack"According to researchers, Matt Suiche of Comae Technologies and Juan Andres Guerrero-Saade of Kaspersky Lab, the Petya attack may actually be a “wiper” malware masquerading as ransomware. This assessment changes the intent of the attack as a wiper…