News
  • "Adding Noise for Completely Secure Communication"
    The use of quantum computers by hackers poses a threat to the security of current communications systems. Quantum computers' quantum-mechanical properties will allow them to perform calculations much faster than today's computers. The speed at which…
  • "New WastedLocker Ransomware Demands Payments of Millions of USD"
    The cybercriminal organization, called "Evil Corp," also known as the Dridex gang, is back in action after the U.S. Department of Justice charged several of its members in December 2019. Fox-IT, a part of the NCC Group, has shared details on changes made…
  • "Scam Uses Elon Musk’s Name to Trick People Out of US$2 Million in Bitcoin"
      Cryptocurrency giveaway scams have been around for a few years now. Cybersecurity firm Adaptiv has discovered that fraudsters are now name-dropping Musk (the founder of Tesla and SpaceX) into the bitcoin address itself, which has tricked victims…
  • "Philadelphia-Area Health System Says It 'Isolated' a Malware Attack"
    Crozer-Keystone, the leading healthcare provider in Delaware County, Pennsylvania, was recently hit by a malware attack. The Crozer-Keystone Health System is composed of four hospitals and four outpatient centers based in Delaware County. It was not made…
  • "Hack Brief: Anonymous Stole and Leaked a Megatrove of Police Documents"
    On Friday of last week, a leak-focused activist group known as Distributed Denial of Secrets (DDoSSecrets) published a 269-gigabyte collection of police data that was supposedly stolen by Anonymous, which is a hacking group.  The data includes…
  • "Privacy and Security Concerns Related to Patient Data in The Cloud"
    Since COVID-19 has started, health delivery organizations (HDOs) have quickly increased their utilization of telehealth capabilities (i.e., remote patient monitoring (RPM) and telemedicine) to treat patients in their homes. Telehealth solutions come with…
  • "Malicious Chrome Extensions Used in Global Surveillance Campaign"
    The cybersecurity firm, Awake Security, released a report on the discovery of 111 malicious or fake Chrome extensions created to collect sensitive user data from users across the world in different industry segments. The primary link between these…
  • CoR&Onavirus Tracing
    CoR&Onavirus Tracing Developing Privacy-Protective Technologies
  • "Majority of COVID-19 Contact Tracing Apps Lack Adequate Security"
    A recent report by Gaurdsqaure reveals that most government COVID-19 contact tracing apps from the U.S. and other countries around the world lack adequate security, leaving the apps vulnerable to hacking. This discovery comes from the assessment of 17…
  • "Netgear Zero-Day Allows Full Takeover of Dozens of Router Models"
    Researchers have discovered an unpatched, zero-day vulnerability in firmware for Netgear routers.  The flaw is a memory-safety issue present in the firmware's httpd web server, and it allows attackers to bypass authentication on affected…
  • "Half of Mobile Banking Apps are Vulnerable to Fraud Data Theft"
    According to a recent study by Positive Technologies, more than half of mobile banking applications are vulnerable to fraud and data theft because of easily exploitable security flaws. The company's security experts examined 14 banking apps. The findings…
  • "Intel's Tiger Lake Processors Will Feature On-Chip Malware Protections"
    Intel recently announced the next generation of Intel mobile processors, which will include a defense mechanism against control-flow hijacking attacks. Intel's Control-Flow Enforcement Technology (Intel CET) will provide this protection via the company's…