News
-
"Ring Adds End-to-End Encryption to Quell Security Uproar"Ring smart doorbells have faced years of criticism from cybersecurity experts for flaws in their system that opened video and data collected by the system to be stolen by adversaries. After many cybersecurity experts stated that Ring lacked…
-
"DarkSide Decryptor Unlocks Systems Without Ransom Payment – for Now"The antivirus company Bitdefender released a free decryptor for DarkSide ransomware to allow victims to unlock their systems and recover their files without having to pay a ransom. According to Bitdefender, their tool can automatically scan and search…
-
"What if Opting Out of Data Collection Were Easy?"Many sites allow users to opt-out of some of their data collection and use practices. However, this choice is hard to find as it is often hidden in long, difficult-to-read privacy policies. A new study by researchers from Carnegie Mellon University'…
-
"Healthcare Hit by 187 Million Monthly Web App Attacks in 2020"Researchers at Imperva, a security vendor, have discovered that web application attacks in the healthcare sector surged in December. Attacks jumped 51% last month from detected volumes in November. Four specific attack types saw the largest…
-
"Critical WordPress-Plugin Bug Found in ‘Orbit Fox’ Allows Site Takeover"Researchers at Wordfence, have discovered two vulnerabilities (one critical) in a WordPress plugin called Orbit Fox. Orbit Fox is a multi-featured WordPress plugin that works with the Elementor, Beaver Builder, and Gutenberg site-building utilities. It…
-
"'Rogue' Android RAT Can Take Control of Devices, Steal Data"Security researchers at Check Point recently discovered a Mobile Remote Access Trojan (MRAT). According to the researchers, the MRAT dubbed Rogue was developed by known Android malware authors Triangulum and HeXaGoN Dev, who have been selling their…
-
"Google Reveals Sophisticated Windows and Android Hacking Operation"Google has released a six-part report, providing details about a complex hacking operation discovered in early 2020. The hacking operation targeted Android and Windows devices. According to Google, the attacks were launched via two exploit servers. Each…
-
"Updated macOS Cryptominer Uses Fresh Evasion Techniques"Researchers at Sentinel Labs have identified an updated version of OSAMiner, the cryptominer that targets the Mac operating system to mine Monero. According to Sentinel Labs, OSAMiner has been active since 2015, spreading through compromised video games…
-
"SolarWinds Hack Investigation Reveals New Sunspot Malware"Crowdstrike researchers have revealed a new strain of malware called Sunspot. This new malware is said to have been used by SolarWinds attackers to inject the Sunburst malicious code into SolarWinds' Orion IT software. Further investigation of the…
-
"Millions of Social Profiles Leaked by Chinese Data-Scrapers"Researchers at Safety Detectives discovered a misconfigured ElasticSearch database owned by Chinese social-media management company SocialArks, which exposed 318 million records from Facebook, Instagram, and LinkedIn. The records included…
-
"Why Older Adults Use (And Do Not Use) Password Managers"A team of researchers from the George Washington University and the University of Maryland, Baltimore County, conducted a study in which they explored what motivates or prevents the adoption of password managers among older adults over the age of 60. The…
-
"How 5G and AI Are Creating an Architectural Revolution"The Intel Federal CTO Steve Orrin and the Dell Federal CTO Cameron Chehreh have discussed the bottom-up transformation of IT by the fifth generation of wireless technology 5G and how this revolution will impact security. 5G will enhance…