News
-
"Snake cyberespionage malware is ready to bite Mac users"A Russian cyberespionage group that goes by the names “Snake, Turla or Uroburos” has been actively launching complex cyberespionage attacks since 2007. The main targets of these attacks are government agencies, including intelligence agencies, military…
-
“Privacy Threats Through Ultrasonic Side Channles on Mobile Devices”Researchers at Technische Universitat Braunschweig in Germany have recently shared their research into the discovery of ultrasonic beacons being used to monitor consumer purchasing and television viewing habits to generate targeted advertising.…
-
"Homeland Security Unit Warns Of Malware Campaign Targeting Critical Systems In The Manufacturing, Energy Sectors"The National Cybersecurity and Communications Integration Center has issued an alert to private sector and government agencies about a persistent malware campaign that is targeting critical systems in energy, healthcare, and manufacturing sectors.…
-
"Internet Atlas maps the physical elements of the internet to enhance security"Researchers at University of Wisconsin- Madison have developed a detailed map that outlines the structure of the worldwide internet called the “Internet Atlas”. This map considers physical elements not visible to the average user, but are crucial to the…
-
"Attackers Unleash OAuth Worm via 'Google Docs' App"Security researchers have discovered a new “Google Docs” phishing campaign that attackers have launched to deceive Google users into logging in and granting permission for the application to access their account permissions. This phishing campaign…
-
"Using Brainwaves to Guess Passwords"Security researchers reveal that a brain-wave-sensing headset by the name of “Epoc+”, can be used to steal private data such as passwords and pins via brain interfaces. Manufactured by Emotiv, the Epoc+ is a headset device with attached electrodes, which…
-
"Doing The Math For Better Encryption"Cybersecurity gets a boost in encryption innovation as scientists at the University of Texas introduce a new technique to generate random numbers, which requires less effort in computation than other methods. This approach on generating random numbers…
-
"Robots Under Attack: Trend Micro Uncovers New Risks"According to new research conducted by Trend Micro and outlined in their report, “Rogue Robots: Testing the Limits of an Industrial Robot’s Security”, robotic manufacturing systems are extremely vulnerable to attacks as it has been revealed that 83,000…
-
"Using AI-enhanced malware, researchers disrupt algorithms used in antimalware"As many organizations and government foundations are being encouraged to embrace the future of artificial intelligence (AI) in the implementation and processes of cybersecurity, concerns of emerging machine learning-based malware arises. Researchers at…
-
"Could a doodle replace your password?"Considering the growing percentage of Americans owning smartphones and the significant amounts of personal and private data that is being stored on these devices, one layer of security is not substantial enough for protecting all that data. This thin…
-
"SOFA-B: Enabling organizations to measure the strength of biometric technologies"The National Institute of Standards and Technology (NIST) wants to create a framework for biometric authenticators with the development of the Strength of Function for Authenticators – Biometrics, or SOFA-B. This framework will help in measuring and…
-
"Hackers using 'cybersquatting' tactics to spoof websites of UK's biggest banks"UK’s most popular banks have been targeted in a scheme in which hackers use fake website domains to impersonate them, deceiving customers into revealing their personal details such as sensitive login credentials. Researchers at DomainTools, a…