News
-
"Malware Attacks Exploiting Machine Identities Double"New research by threat analysts at Venafi reveals that the number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019. Applications and devices use machine identities that are made from cryptographic keys and…
-
"Consumers Don't Fully Trust Smart Home Technologies"Although smart home technologies are marketed to increase the convenience of our daily lives, many consumers still do not trust the privacy and security of these technologies. Researchers from WMG and Computer Science, University of Warwick, conducted a…
-
"Researchers Found Another Way to Hack Android Cellphones via Bluetooth"Security researchers at DBAPPSecurity have discovered an authentication bypass vulnerability, dubbed “BlueRepli.” An adversary can bypass authentication by imitating a device that has previously been connected with a target. Victims do not need to…
-
"TeamViewer Flaw Could be Exploited to Crack Users’ Password"Security researchers have discovered a high-risk vulnerability (CVE-2020-13699) in TeamViewer for Windows. If the vulnerability is exploited, remote attackers could crack the users’ password, which could lead to further system exploitation. CVE-…
-
"New EtherOops Attack Takes Advantage of Faulty Ethernet Cables"A team of researchers from the Internet of Things (IoT) security company Armis discovered a technique, dubbed EtherOops, that could be used to attack devices placed inside closed enterprise networks. According to the researchers, the method can only be…
-
"Misconfigured Servers Contributed to More Than 200 Cloud Breaches"A new report from Accurics, titled "The State of DevSecOps," reveals that the misconfiguration of storage services in over 90 percent of cloud deployments have led to more than 200 breaches in the past two years. These breaches have exposed more than 30…
-
"Your Mobile Location Data Could Pose Security Threats: NSA"The U.S. National Security Agency (NSA) released a report on how location data tracked via mobile phones and other connected devices such as fitness trackers, smartwatches, and built-in vehicle communication devices could threaten security. While the…
-
"Researchers Uncover Vulnerabilities in Devices Used at Industrial Facilities"After 2015 when Russian hackers were able to hack three Ukrainian power companies, some security experts took it on themselves to show how protocol gateways could be exploited at other utilities. New research has been conducted by researchers at…
-
"4 in 10 Organizations Punish Staff For Cybersecurity Errors"To examine the prevalence of punishment in businesses and the impact of this on staff, a team of researchers led by Dr. John Blythe, Head of Behavioral Science at CybSafe, conducted a survey of cybersecurity awareness professionals as well as an…
-
"Interpol Warns of 'Alarming' Cybercrime Rate During Pandemic"The international criminal police organization Interpol has warned of the significant rise in cybercrime during the coronavirus pandemic. An assessment conducted by the organization has revealed that cybercriminals have shifted their focus…
-
"Research Reveals Dangerous Design Flaws and Vulnerabilities in Legacy Programming Languages"Trend Micro shared new research conducted in collaboration with Politecnico di Milano that brings further attention to the design flaws in legacy languages and introduces new secure coding guidelines. The study provides details about how design flaws in…
-
"New Method to Defend Against Smart Home Device (IoT) Attacks Developed by BGU Researchers"A team of researchers from Ben-Gurion University of the Negev (BGU) and the National University of Singapore (NUS) developed a new method that Telecommunications Service Providers (TSPs) and Internet Service Providers (ISPs) can use to detect vulnerable…