News
  • "DHS Asks for Feedback on Vulnerability Disclosure Program"
    The U.S. Department of Homeland Security (DHS) seeks feedback in regard to an enterprisewide vulnerability disclosure program, which will allow ethical hackers to safely and legally disclose hackable vulnerabilities found in the department's systems.…
  • "Hackers Could Steal a Tesla Model S by Cloning Its Key Fob—Again"
    In 2018, researchers from Belgium's KU Leuven university discovered a security vulnerability in the Tesla Model S that could allow hackers to create a duplicate of the car's key fob in order to unlock and steal the car. In response to this discovery…
  • "1 in 4 Employees Would Steal Company Information to Secure Their Next Job"
    It has been discovered that nearly one in four (24%) of employees that were surveyed said they would take company information to help apply for a position at a competitor.  The Gurucul study also found that managed service providers or…
  • "Smartphone Apps May Connect to Vulnerable Backend Cloud Servers"
    A team of researchers from the Georgia Institute of Technology and Ohio State University has discovered more than 1,000 security flaws in the backend systems used for the top 5,000 apps available in the Google Play Store. These backend systems are used…
  • "Stolen Fingerprints Could Spell the End of Biometric Security – Here’s How to Save It"
    A biometrics database, called Biostar 2, was recently found to be publicly accessible online. Researchers at VPNMentor were able to access the database containing over 27.8 million records, which included unencrypted fingerprint data, facial recognition…
  • "Over Half of Social Media Logins Are Fraudulent"
    It has been discovered that 53% of all logins on social media sites are fraudulent. The report, analyzed more than 1.2 billion transactions made between April 1, 2019, and June 30, 2019.  It was found that 11% of all online transactions,…
  • "A Major Cyber Attack Could Be Just as Deadly as Nuclear Weapons"
    Jeremy Straub, an assistant professor of computer science at North Dakota State University, has pointed out the possible catastrophe that could result from a major cyberattack. A significant cyberattack with far-reaching impact could lead to casualties.…
  • "Router Guest Networks Lack Adequate Security, According to Researchers at Ben-Gurion University"
    A new study conducted by researchers at Ben-Gurion University brings attention to the vulnerability of routers to cross-router leaks resulting from an attack on either a host or guest network. According to researchers, all of the routers examined in this…
  • "Security Researchers Find Several Bugs in Nest Security Cameras"
    Researchers at Cisco Talos have discovered eight vulnerabilities in Nest Cam IQ, a smart security camera developed by Google. According to researchers, these vulnerabilities derive from the implementation of the Internet of Things (IoT) communication…
  • "Cisco Releases New Security Tool to Identify Vulnerabilities in Connected Cars"
    Cisco has released an open-source hardware tool, called 4CAN, to be used by automobile security researchers and car manufacturers to discover vulnerabilities in connected cars. While connected cars offer benefits to users, they also introduce significant…
  • "Five Vendors Accounted for 24.1% of Vulnerabilities in 2019 so far"
    It has been discovered that five major vendors accounted for 24.1% of vulnerabilities in 2019 so far. Further analysis reveals that 54% of 2019 vulnerabilities are Web-related, 34% have public exploits, 53% can be exploited remotely, and that 34% of 2019…
  • "New Tools to Minimize Risks in Shared, Augmented-Reality Environments"
    Augmented reality (AR) is expected to be increasingly used in group activities such as multi-user gaming or collaborating on projects. Therefore, developers need a better approach to addressing the potential security and privacy issues associated with…