News
-
"Are we Doing Enough to Protect Connected Cars?"Cars are becoming more connected and should meet the highest level of security, safety, and performance. However, that is not always the case. As cars have become more connected and have more autonomous features, cars are extremely susceptible to…
-
"WordPress WooCommerce Sites Targeted by Card Swiper Attacks"Credit card swipers found a new hard-to-detect way to target WordPress websites using the WooCommerce plugin. Researchers at Securi, have discovered that credit card swipers are hiding malicious JavaScript code inside system files. Most…
-
"MSC Data Center Closes Following Suspected Cyber-Attack"The Mediterranean Shipping Company (MSC) recently reported a network outage at one of its data centers, which took down its website msc.com and myMSC portal. According to a message posted on Twitter by MSC, there is a chance that malware caused the…
-
"TikTok Flaw Allows Threat Actors to Plant Forged Videos in User Feeds"Researchers have discovered a security weakness in the popular TikTok video-sharing service, which could allow a local attacker to hijack any video content streamed to a user's TikTok feed and swap it out with hacker-generated content. The flaw is…
-
"Check Point Reveals Cyber Security Impact of COVID-19"Dimensional Research conducted a survey for Check Point to which 411 IT and security professionals from companies with more than 500 employees responded. The purpose of this study was to explore how the coronavirus outbreak has impacted enterprise…
-
"Google Removes Android VPN With ‘Critical Vulnerability’ From Play Store"Google has removed an Android VPN program from the Google Play Store called SuperVPN after researchers notified Google of a critical vulnerability in the application. The app SuperVPN was downloaded over 100 million times. Researchers at…
-
"Going Phishing: The Most Imitated Big Name Brands"Attackers often masquerade as popular brands in the execution of phishing attacks. A new report released by the cybersecurity firm Check Point reveals which brands were the most imitated for phishing attacks launched in Q1 2020 and the top phishing…
-
"New Wiper Malware Impersonates Security Researchers as Prank"Attackers are distributing MBRLocker malware to prevent a victim's computer from starting. The malware displays a message stating that two respected, well-known security researchers by the names of Vitali Kremez and MalwareHunterTeam executed…
-
"Hackers Sell Thousands of Zoom User Account Credentials on Dark Web"As more workers use the video-conferencing platform Zoom to have meetings amid the coronavirus pandemic, hackers are taking advantage of the flaws contained by the service to steal credentials. A recent investigation by researchers at IntSights revealed…
-
"Bolstering Internet Security"Researchers at Princeton University, in collaboration with Let's Encrypt, developed a countermeasure against website counterfeiting, which has improved security for millions of websites since it went live on February 19. The countermeasure addresses a…
-
"You Have to Consider Cybersecurity at All Points of a Cloud Migration"Researchers at Gartner predict that by 2021, more than 75 percent of midsize and large organizations will adopt a multi-cloud or a hybrid IT strategy. As more organizations use cloud platforms, IT and DevOps teams face additional uncertainties…
-
"Hackers Breach San Francisco Airport Websites"Researchers have discovered that SFOConnect.com and SFOConstruction.com were both hacked. SFOConnect.com provides updates about the San Francisco Airport to passengers and travelers, and SFOConstruction.com provides information about construction…