News
  • "Layering Diverse Defenses Is Crucial for Stopping Email Attacks"
    The use of technology alone is not sufficient enough to defend against targeted email attacks. Adding to that, Evan Reiser, CEO of Abnormal Security, states that providing security awareness and anti-phishing training to employees is not a silver bullet…
  • "New 'Secure' Voting Machines Are Still Vulnerable—Because of Voters"
    Researchers at the University of Michigan did a new study on the security of voting machines. Findings suggest that people are less likely to notice if a hacker compromised a machine because many of them do not check whether the printout of their ballot…
  • "Devices Still Vulnerable to DMA Attacks Despite Protections"
    According to the firmware security company, Eclypsium, many devices, including those used in enterprise environments, are still vulnerable to direct memory access (DMA) attacks despite the implementation of protections by hardware and software vendors to…
  • "80% of Successful Breaches Are From Zero-Day Exploits"
    In a new study, researchers surveyed 671 IT security professionals responsible for managing and reducing their organization’s endpoint security risk. The researchers found that 68% of IT security professionals say their company experienced one or more…
  • "The Fractured Future of Browser Privacy"
    Security researchers, privacy advocates, and developers recently gathered at the USENIX Enigma security conference in San Franciso to discuss their views on how browsers should protect users' data. Representatives from Mozilla Firefox, Google Chrome,…
  • "Ring Doorbell App Packed with Third-Party Trackers"
    The Electronic Frontier Foundation (EFF) conducted an investigation of the Ring doorbell app for Android and found that it contains a number of third-party trackers that share customers' personally identifiable information (PII). According to EFF, there…
  • "Zoom Vulnerability Would Have Allowed Hackers to Eavesdrop on Calls"
    Check Point cybersecurity researchers recently released a report in which they discuss their discovery of vulnerabilities contained by the popular video conferencing platform, Zoom. According to the report, the exploitation of these vulnerabilities would…
  • "Researchers Introduce the First All-Optical, Stealth Data Encryption Technology"
    The first all-optical "stealth" encryption technology has been introduced by Ben-Gurion University of the Negev's (BGU) technology-transfer company, BGN Technologies. The optical end-to-end solution will significantly improve upon the security and…
  • "UN Hacked: Attackers Got in Via SharePoint Vulnerability"
    The United Nations (UN) was affected by a breach in the summer of 2019 and was kept secret until now. The attack started in July 2019, when the adversaries were able to compromise a server located at the UN Office in Vienna through a security hole in…
  • "USC Kicks Off 50-State Election Cybersecurity Trainings"
    The University of Southern California (USC) is making an effort to bolster election cybersecurity through its nonpartisan and independent 50-state election cybersecurity training initiative. Training is provided in each state to participants via daylong…
  • "RiskSense Working on AI to Predict if Vulnerabilities Will Turn Into Ransomware"
    RiskSense recently announced an update to its subscription-based SaaS software, which will help companies better predict if their security vulnerabilities will be exploited by bad actors to target them in ransomware attacks. The update provides a…
  • "2020: A Year of Deepfakes and Deep Deception"
    In 2019 deepfakes became a major emerging cyber threat. Deepfakes is a machine learning model that can create realistic yet fake or manipulated audio and video. Researchers have mostly thought about Deepfake technology potentially being used to spread…