News
-
"Organized Cybercrime: Not Your Grandfather’s Mafia"Research from Michigan State University explored whether the stereotype of organized crime applies to organizations of hackers. The study identified the common characteristics of cybercrime networks, examining how groups in these networks operate and…
-
"Emotet Can Spread to Poorly Secured Wi-Fi Networks And Computers on Them"Researchers have discovered and analyzed a malware program that can spread the Emotet Trojan to nearby wireless networks and compromise computers on them. Emotet is one of the most versatile malware threats currently used. The researchers found that…
-
"Thwarting Hacks by Thinking As the Humans Behind Them"A study conducted at Michigan State University highlights the importance of paying closer attention to the potential motives behind cyberattacks to improve the prediction, identification, and prevention of cyberattacks. While it is essential to follow…
-
"Charging Your Phone Using a Public USB Port? Beware of 'Juice Jacking'"Travelers are urged to avoid using publicly available USB power charging stations because they may be infected with dangerous malware. The Los Angeles County District Attorney's Office recently pointed out the use of publicly accessible USB charging…
-
"An Artist Used 99 Phones to Fake a Google Maps Traffic Jam"An artist named Simon Weckert created the Google Maps Hack to bring further attention to the potential ease at which malicious actors can fool a product such as Google Maps and other similar products. The Google Maps Hack project was prompted by an…
-
"Your Philips Hue Light Bulbs Can Still Be Hacked — And Until Recently, Compromise Your Network"In 2016, security researchers demonstrated the use of a drone to hack Philips Hue smart light bulbs from the outside of a building. Today, security researchers from Check Point conducted another test on Philips Hue models. They discovered that the same…
-
"Critical Cisco 'CDPwn' Flaws Break Network Segmentation"Cisco issued patches for five critical vulnerabilities contained by the CISCO Discovery Protocol (CDP), which is a tool used by network administrators and engineers to identify and map Cisco products on a network. According to researchers at the…
-
"Malware And Ransomware Attack Volume Down Due to More Targeted Attacks"Results of threat intelligence collected throughout 2019 through the use of over 1.1 million sensors placed in over 215 countries and territories were published in the 2020 SonicWall Cyber Threat Report. The researchers found that there were 9.9 billion…
-
"New York City Partners with Israel-based Firm to Boost Cybersecurity"New York City and an Israel-based venture capital firm, named Jerusalem Ventures Partners (JVP) is partnering in support of the Cyber NYC initiative. The initiative aims to make NYC a global leader in cyber innovation and increase the number of…
-
"New Ransomware Targets Industrial Control Systems"New ransomware aimed at disrupting the processes associated with industrial control systems (ICS) operations, called EKANS, is being analyzed by security researchers from SentinelOne, Dragos, and the MalwareHunterTeam. According to researchers, EKANS…
-
"How Device-Aware 2FA Can Defeat Social Engineering Attacks"Hackers continue to sharpen their skills in the execution of social engineering attacks, resulting in the increased success rate at which they bypass two-factor authentication (2FA) and hijack accounts. SMS-based 2FA remains popular among financial…
-
"Twitter API Abused to Uncover User Identities"Researchers have discovered that bad actors with potential ties to state-sponsored groups, were abusing a legitimate function on Twitter's platform to unmask the identity of users. On December 24, 2019, Twitter discovered an extensive network of…