News
-
"Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security"Artificial intelligence (AI) is increasingly growing in implementation by organizations. Security professionals expect large organizations of all types to find AI-based tools necessary for the protection of their assets from cyberattacks by the end…
-
"Watch Out for Coronavirus Phishing Scams"Security firms are discovering that hackers are exploiting the fear caused by the coronavirus outbreak to perform phishing scams. One phishing email detected by Mimecast contains malicious links and PDFs, claiming to have information about how…
-
"97 of the World's 100 Largest Airports Have Massive Cybersecurity Risks"In a new study on the world's biggest airports, a security company ImmuniWeb found that almost all of them had an alarming lack of systems in place to protect their websites, mobile applications, and public clouds. 66 of the top 100 airports had highly…
-
"Layering Diverse Defenses Is Crucial for Stopping Email Attacks"The use of technology alone is not sufficient enough to defend against targeted email attacks. Adding to that, Evan Reiser, CEO of Abnormal Security, states that providing security awareness and anti-phishing training to employees is not a silver bullet…
-
"New 'Secure' Voting Machines Are Still Vulnerable—Because of Voters"Researchers at the University of Michigan did a new study on the security of voting machines. Findings suggest that people are less likely to notice if a hacker compromised a machine because many of them do not check whether the printout of their ballot…
-
"Devices Still Vulnerable to DMA Attacks Despite Protections"According to the firmware security company, Eclypsium, many devices, including those used in enterprise environments, are still vulnerable to direct memory access (DMA) attacks despite the implementation of protections by hardware and software vendors to…
-
"80% of Successful Breaches Are From Zero-Day Exploits"In a new study, researchers surveyed 671 IT security professionals responsible for managing and reducing their organization’s endpoint security risk. The researchers found that 68% of IT security professionals say their company experienced one or more…
-
"The Fractured Future of Browser Privacy"Security researchers, privacy advocates, and developers recently gathered at the USENIX Enigma security conference in San Franciso to discuss their views on how browsers should protect users' data. Representatives from Mozilla Firefox, Google Chrome,…
-
"Ring Doorbell App Packed with Third-Party Trackers"The Electronic Frontier Foundation (EFF) conducted an investigation of the Ring doorbell app for Android and found that it contains a number of third-party trackers that share customers' personally identifiable information (PII). According to EFF, there…
-
"Zoom Vulnerability Would Have Allowed Hackers to Eavesdrop on Calls"Check Point cybersecurity researchers recently released a report in which they discuss their discovery of vulnerabilities contained by the popular video conferencing platform, Zoom. According to the report, the exploitation of these vulnerabilities would…
-
"Researchers Introduce the First All-Optical, Stealth Data Encryption Technology"The first all-optical "stealth" encryption technology has been introduced by Ben-Gurion University of the Negev's (BGU) technology-transfer company, BGN Technologies. The optical end-to-end solution will significantly improve upon the security and…
-
"UN Hacked: Attackers Got in Via SharePoint Vulnerability"The United Nations (UN) was affected by a breach in the summer of 2019 and was kept secret until now. The attack started in July 2019, when the adversaries were able to compromise a server located at the UN Office in Vienna through a security hole in…