News
-
"'Knock Codes' For Smartphone Security Are Easily Predicted, Researchers Say"The knock code authentication scheme, popularized by LG in 2014, is not as safe or effective as users think. Knock codes allow smartphone owners to create tap patterns that they could use to unlock their phone. A team of researchers from the New Jersey…
-
"Microsoft Issues Patch for Wormable Windows DNS Server Flaw"Microsoft is issuing a patch for a 17-year-old wormable Windows Domain Name System (DNS) Server vulnerability discovered by a researcher at Check Point. The exploitation of the DNS Server flaw would allow attackers to intercept users' emails and network…
-
"Billions of Stolen Passwords For Sale on The Dark Web"Researchers have discovered that there are more than 15 billion stolen account credentials that are up for sale on cybercrime forums. Five billion of the stolen credentials up for sale are considered unique, meaning that they have not been offered…
-
"Security Researcher Finds Unencrypted Video on Bodycam From Fort Huachuca"A security researcher was able to extract audio and video from a used Axon body camera they purchased on eBay. The researcher extracted unencrypted data from the camera's microSD card using a forensics tool developed by the Air Force Office of Special…
-
"Critical SAP Bug Allows Full Enterprise System Takeover"SAP has disclosed to its customers a critical vulnerability that has scored a severity score of 10 out of 10 on the CvSS bug-severity scale. SAP has a widely deployed collection of enterprise resource planning (ERP) software, which clients use to…
-
"Filter Protects Against Deepfake Photos and Videos"Deepfakes are fake images, audio recordings, or videos developed using Machine Learning (ML). The continued advancement of deepfakes will decrease the effectiveness of security systems that apply facial recognition technologies for authentication.…
-
"Backdoors Identified in C-Data Fiber Broadband Devices"Security researchers have identified backdoors in 29 C-Data Fiber-To-The-Home (FTTH) Optical Line Terminal (OLT) devices. According to the researchers, an attacker can extract administrator credentials via the command-line interface (CLI) if they have…
-
"TrickBot Malware Mistakenly Warns Victims That They Are Infected"The developers of the infamous modular banking trojan, called TrickBot, have made a mistake that results in alerts to victims. Once infected, victims will receive a warning that brings attention to the malware's presence on their device and the need to…
-
"Popular Home Routers Plagued by Critical Security Flaws"In a new study, researchers tested more than 100 consumer-grade routers from seven large vendors. The researchers discovered that nearly all tested routers were affected by scores of unpatched and often severe security flaws, which could put users…
-
"Coordinating Disclosures of Medical Device Vulnerabilities"Healthcare organizations continue to face significant cybersecurity threats that could affect people's well-being and safety. Therefore, the medical device manufacturer, Becton, Dickinson and Company (BD), has enhanced its coordinated vulnerability…
-
"Avoiding Malware on the Move"In an article published in the International Journal of Internet Technology and Secured Transactions, researchers from India discussed the security measures implemented for mobile devices that use Google's Android operating system. The researchers…
-
"USB Storage Devices: Convenient Security Nightmares"USB storage devices are very convenient however, from a business security perspective, their highly accessible and portable nature makes them a complete nightmare. According to new research, the researchers found that due to COVID-19, there has…