News
-
"Billions of Devices Open to Wi-Fi Eavesdropping Attacks"Researchers at ESET discovered a critical bug in Wi-Fi chips, which affects billions of devices, including smartphones, tablets, laptops, and routers from Amazon, Apple, Google, Samsung, and others. The vulnerability, dubbed Kr00k, derives from an all-…
-
"Why Threat Intelligence Gathering Can Be a Legal Minefield"The Department of Justice (DoJ) released a report, titled "Legal Considerations When Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources." The report highlights the risks that security researchers and organizations face…
-
"Intel Announces New Hardware-based Security Capabilities"Intel recently announced four new hardware-based security capabilities and gave additional information on its Computer Lifecycle Assurance supply chain transparency initiative. The new capabilities are application isolation, VM and container isolation,…
-
"Businesses at Risk for Cyberattack but Take Few Precautions"Verizon recently released a report on mobile security that discusses the results of a survey to which 876 people responsible for the purchase, management, and security of mobile devices at companies, responded. According to the report, there has been a…
-
"Methodologies and Methods to Improve IoT Security"Deral Heiland, the Internet of Things (IoT) research lead at Rapid7, gave a presentation at the RSA Conference in which he discussed the development of a comprehensive IoT security testing methodology. The methodology would help companies determine the…
-
"Chrome 80 Encryption Change Blocks AZORult Password Stealer"New research has discovered that Chrome 80's move to encrypt locally saved passwords and cookies using AES-256 has had a significant adverse effect on a hugely successful data and user profile stealing malware called AZORult. Researchers used the crime…
-
Dr. Celeste Paul talks about Hacking Stress in Cybersecurity OperationsCeleste Lyn Paul is a Senior Researcher at the National Security Agency. Her work focuses on understanding the human factors of cybersecurity. See her recent RSA Conference keynote on Hacking Stress in Cybersecurity Operations here: https://www.…
-
"Modern Malware Is Increasingly Leveraging Evasive Behaviors"A new report released by VMware Carbon Black at the 2020 RSA Conference discusses the top attack methods and procedures observed by researchers over the last year. The report also gives organizations recommendations on how to deal with threats such as…
-
"Computer Scientists’ New Tool Fools Hackers Into Sharing Keys for Better Cybersecurity"Computer scientists from the University of Texas at Dallas have developed a new approach to combatting hackers. Their method, called DEEP-Dig (DEcEPtion DIGging), lures hackers into a decoy site at which researchers can examine their tactics, tools, and…
-
"Surfing Attack Hacks Siri, Google with Ultrasonic Waves"Previous studies have proven that ultrasonic waves can be used to deliver a single command to a cellphone through the air. New research by researchers at Washington University has expanded the scope of vulnerability that ultrasonic waves pose to…
-
"Sen. Warner Says DoD Must Strengthen Cyber Vulnerability Disclosure Programs"In a letter to Dana Deasy, CIO of the Department of Defense (DoD), US Senator Mark Warner (D-VA) brought further attention to the importance of vulnerability disclosure programs. News of the discovery of malware on a DoD-operated web server and how…
-
"Almost Three-Quarters of All Phishing Sites Now Use SSL Protection"2019 was one of the most dangerous years on record for online users. Researchers detected 162,144 phishing websites worldwide between October and December 2019, and 266,387 phishing attacks were recorded in July through September 2019. New research…