News
  • "Tesla Model 3 Hacked in Less Than 2 Minutes at Pwn2Own Contest"
    Hackers from the France-based penetration testing company Synacktiv recently demonstrated two different Tesla Model 3 exploits at the Pwn2Own hacking contest in Vancouver. The attacks granted them extensive access to subsystems controlling the safety and…
  • "New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords"
    A new information-stealing malware has targeted Apple's macOS operating system in an effort to steal sensitive data from infected devices. MacStealer is the latest example of malware distribution that involves Telegram as a command-and-control (C2)…
  • "Kids Tech Camp iD Tech Still Silent Weeks After Data Breach"
    Parents are still looking for answers weeks after hackers stole the personal data of thousands of users from kids' tech coding camp iD Tech.  Many parents fear their children's data was compromised during the data breach.  iD Tech, which…
  • "Student Hackers Take Control, Learn How to Protect Transportation Infrastructure"
    Jake Jepson, a master's student in the Department of Systems Engineering at Colorado State University, is aware of how vulnerable cars can be because he and his peers practice taking control of them via cyberattacks. Jepson is a member of the Systems…
  • "Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform"
    Intel recently announced the latest version of its vPro platform for the newly launched 13th Gen Core processors, claiming that it significantly improves security.  The vPro platform is designed to enhance performance, security, manageability, and…
  • "Computer Engineering Research Prompts Bug Fixes, Updates to Major GPU Frameworks"
    Graphical Processing Units (GPUs) are the driving force behind some of the most important topics in computer science today, including Artificial Intelligence (AI) and Machine Learning (ML). When major technology companies build their own GPUs for use in…
  • "UK Parliament Bans TikTok from its Network and Devices"
    The UK parliament has recently followed the government's lead in banning TikTok from official devices and gone further by not allowing any users to access the social networking app from its network.  The news follows similar decisions by the…
  • "ORNL Malware 'Vaccine' Generator Licensed for Evasive.ai Platform"
    The use of Artificial Intelligence (AI) and Machine Learning (ML) is transforming technology and product development, resulting in the creation of more intelligent, efficient, and tailored applications that use large amounts of data. However, the…
  • "Security Flaws Cost Fifth of Execs Business"
    Security researchers at Trend Micro have discovered that boards continue to under-appreciate the value of cybersecurity to the business, despite acknowledging its critical role in winning new business and talent.  The researchers polled 2718…
  • "The End of Text-Based Passwords? TIM Provides a New Solution"
    In a new study, computer scientists from the University of Surrey present an image-based authentication system for mobile phones called Transparent Image Moving (TIM) that helps lower the risk of shoulder surfing attacks. Shoulder surfing is a security…
  • "IRS Phishing Emails Used to Distribute Emotet"
    Security researchers at Malwarebytes are warning US taxpayers not to fall for a new phishing campaign using the IRS as a lure to install notorious Trojan Emotet on their machines.  Scammers have long used tax filing season as an opportunity to trick…
  • "Critical Infrastructure Gear Is Full of Flaws, but Hey, at Least It's Certified"
    According to security researchers, devices used in critical infrastructure are infested with vulnerabilities that can cause Denial-of-Service (DoS), enable configuration manipulation, and help attackers achieve Remote Code Execution (RCE). In addition,…