News
-
"LogoFAIL Attack Can Install UEFI Bootkits Through Bootup Logos"A collection of security vulnerabilities named LogoFAIL affects image-parsing components in the Unified Extensible Firmware Interface (UEFI) code from different vendors.
-
"Organizations Can't Ignore the Surge in Malicious Web Links"According to Hornetsecurity, even though there has been an increase in the adoption of collaboration and instant messaging software, email remains a significant concern regarding cyberattacks.
-
"New Turtle macOS Ransomware Analyzed"Patrick Wardle, a cybersecurity researcher specializing in Apple products, has analyzed a new macOS ransomware named Turtle.
-
"Simple Hacking Technique Can Extract ChatGPT Training Data"According to a team of researchers from Google DeepMind, Cornell University, and four other universities who tested ChatGPT's vulnerability to leaking data when prompted in a certain way, getting it to repeat the same word can cause it to regurgitate l
-
"This Leica Camera Stops Deepfakes at the Shutter - First Camera With Built-in Content Credentials Verifies Photos' Authenticity"The Leica M11-P, which was announced in late October, is the world's first camera to support content credentials, an encryption technology that ensures the authenticity of photos taken by the camera.
-
"The Study of PGP Web of Trust Based on Social Network Analysis"A study published in the International Journal of Business Information Systems used social network analysis to look at the most important and influential users employing Pretty Good Privacy (PGP) data encryption.
-
"Suspected China-Based Hackers Target Uzbekistan Gov't, South Koreans, Cisco Says"A new report reveals that the Uzbekistan Ministry of Foreign Affairs and people in South Korea are being targeted by hackers based in China using the SugarGh0st malware strain.
-
"The Vast Majority of Us Have No Idea What the Padlock Icon on Our Internet Browser Is – And It's Putting Us at Risk"According to a new study from Cardiff Metropolitan University, only 5 percent of UK adults understand the significance of the padlock in the Internet browser's address bar, posing a threat to online safety.
-
"AI: The New Puppet Master Behind Cyberattacks"Artificial Intelligence (AI)-driven social engineering attacks are reshaping the threat landscape.
-
"Understanding the Security of Mobile Apps in Africa"A team of researchers from CyLab-Africa and the Upanzi Network recently collaborated with Approov, a mobile security provider, to analyze the security of popular financial services apps used across Africa.
-
"Researchers Break Apple's New MacBook Pro Weeks After Release"A Georgia Tech researcher successfully bypassed security measures on Apple's latest MacBook Pro equipped with the M3 processor chip in order to get his fictitious target's Facebook password and second-factor authentication text. Jason Kim, a Ph.D.