News
  • "New York Water System Audit Finds Cybersecurity Flaws"
    An audit of the New York water system by the New York State Comptroller's Office revealed cybersecurity flaws associated with policies and procedures. State-hired technology experts discovered vulnerabilities that could have been exploited by hackers to…
  • "Smart Lock Has a Security Vulnerability That Leaves Homes Open for Attacks"
    A vulnerability in the KeyWe smart lock has been discovered by security researchers at F-Secure. KeyWe's smart lock was designed to make it easier for homeowners to lock and unlock their doors by allowing them to do so through the use of an app. However…
  • "Hackers Can Mess With Voltages to Steal Intel Chips' Secrets"
    Researchers from the University of Birmingham in the UK, TU Graz in Vienna, KU Leuven in Belgium, Technische Universität Darmstadt in Germany, and the University of California have discovered a new method that can be used by attackers to steal sensitive…
  • "Over 750,000 Applications For US Birth Certificate Copies Exposed Online"
    A U.K.-based penetration testing company Fidus Information Security found more than 752,000 applications for copies of birth certificates on an Amazon Web Services (AWS) storage bucket. The bucket discovered also had 90,400 death certificate applications…
  • "The Drums of Cyberwar"
    If the U.S. were to experience a major attack on its critical infrastructure, there could be major consequences. Recent studies have shown that a cyberattack on critical infrastructure has the potential to harm public health and significantly reduce…
  • "Australian and European Police Shut Down Access to Popular Criminal Hacking Tool"
    A widely-used remote-access hacking tool, called the Imminent Monitor Remote Access Trojan (IM-RAT), was recently taken down by Australian and European law enforcement. The tool had been sold to a little over 14,000 buyers in 124 countries via the…
  • "Microsoft Demystifies Email Attack Campaigns Targeting Organizations"
    Using email is the preferred method for adversaries to gain a foothold into organizations. A new tool is now available to some Microsoft enterprise customers called Campaign Views. This new tool allows security teams to see how successful…
  • "A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors"
    Google announced that it had achieved quantum supremacy by performing a specific quantum computation at a greater speed than the best classical computers. IBM contested Google's claim of quantum supremacy, expressing that it had already made this…
  • "Linux Bug Opens Most VPNs to Hijacking"
    Security researchers at the University of New Mexico and Breakpointing Bad discovered a vulnerability that is contained by most Linux distributions. The researchers used a proof-of-concept exploit that allowed them to determine whether a user is…
  • "Compromised Passwords Used on 44 Million Microsoft Accounts"
    In a news study, Microsoft has found that 44 million Microsoft Azure AD and Microsoft Services accounts are vulnerable to account hijacking due to users using compromised passwords. Microsoft forced users to change their passwords if they found that the…
  • "Honeypots: Best Bet for IoT Security?"
    The electronics manufacturer, Panasonic, recently discussed how it improved the security of its Internet of Things (IoT) devices. The company is using specially crafted honeypot sites to trick cybercriminals into executing attacks against what appear to…
  • "Fingerprint Login Should Be a Secure Defense for Our Data, But Most of Us Don't Use It Properly"
    The implementation of biometrics-based security in Apple's iOS such as fingerprint authentication is supposed to add an extra layer to the protection of users' sensitive information. However, this feature is still being improperly used by most people. A…