News
-
"New Tool Can Check for Data Leakage From AI Systems"Artificial Intelligence (AI) helps companies power many applications, such as those used to improve marketing strategies, recommendation services, and health services. Although AI offers many benefits, security and privacy researchers have…
-
"Cadbury Social Media Scammers Take Chocoholics for a Ride"A fake Facebook Group has been discovered and is being used to trick social media users into divulging their personal and financial details to win free Cadbury chocolate. Various posts from the group claim that the chocolate-maker, now owned by…
-
"Malicious Use of SSL Increases as Attackers Deploy Hidden Attacks"Researchers at Zscaler analyzed 6.6 billion security threats in a new study and discovered that there had been a 260% increase in the use of encrypted traffic to "hide" attacks during the first nine months of 2020. They also found that the use of…
-
"Insecure APIs a Growing Risk for Organizations"Application Programming Interfaces (APIs) face the same vulnerabilities as regular web applications. According to Forrester Research, as APIs enable direct external access to transaction updates and mass data, they are subjected to more threats than…
-
"Vulnerabilities Affect 100,000 Sites Using WordPress Plugin"Three critical privilege-escalation vulnerabilities were discovered in a WordPress plugin, impacting 100,000 websites. Wordfence's Threat Intelligence Team detected the flaws in Ultimate Member, which is a free user profile WordPress plugin that supports…
-
"Apple Releases Patches for 3 iOS Zero-Days That Hackers Used for Targeted Attacks"Apple has released patches for three critical vulnerabilities discovered in its software used for iPhones, iPads, and iPods. Two of the critical bugs impact the core of the device's operating system called the kernel, responsible for handling…
-
"New Tool Detects Unsafe Security Practices in Android Apps"Computer scientists at the Columbia University developed a new tool called CRYLOGGER to detect when an Android app is misusing cryptography. The tool detects whether an Android app violates guidelines set by expert cryptographers and organizations such…
-
"SwRI Hacks Electric Vehicle Charging to Demonstrate Cybersecurity Vulnerabilities"Engineers at Southwest Research Institute simulated an attack on the charging process of an electric vehicle (EV) to bring further attention to the cybersecurity vulnerabilities associated with EV charging. They reverse-engineered the signals and…
-
"Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak"A widely used hotel reservation platform called Cloud Hospitality has exposed 10 million files related to guests at various hotels worldwide, thanks to a misconfigured Amazon Web Services S3 bucket. Cloud Hospitality is used by hotels to integrate their…
-
"New Cyber Technologies Protect Utility Energy Delivery Systems"Researchers from the Pacific Northwest National Laboratory (PNNL) worked with utility advisors and companies specializing in vulnerability identification to develop two new web-based tools aimed at mitigating cybersecurity vulnerabilities in operational…
-
"Ransomware Attack Toys With Mattel Systems, Data"Mattel, one of the largest toy manufacturers in the world, recently fell victim to a ransomware attack in July on its information technology systems. The attack temporarily impacted its business functions. However, no data regarding business operations,…
-
"1 in 4 Cyberattacks Handled by U.K.'s NCSC Were Related to COVID-19"The United Kingdom's National Cyber Security Center's (NCSC) annual threat report revealed that U.K. organizations experienced an average of 60 cyberattacks per month from September 2019 to August 2020. The NCSC's defense system stopped more than 15,000…