News
-
"'Cable Haunt' Vulnerability Exposes 200 Million Modem Cables to MITM Attacks"Researchers from Lyrebirds, along with an independent researcher, discovered a security vulnerability, named Cable Haunt, in Broadcom's cable modem. The flaw left an estimate of 200 million home broadband gateways susceptible to remote hijacking attacks…
-
"Lawmakers Ask FCC to Protect Consumers from Phone Hijackers"Lawmakers are asking the Federal Communications Commission (FCC) to use the regulatory agency's authority over wireless carriers to enforce better protection for consumers from SIM swap scams. Fraudsters perform these scams by persuading wireless…
-
"How to Implement a 'Threat Model' to Beef up Your Organization’s Security"Security professionals are encouraged to practice threat modeling to bolster the security of their organizations. Threat modeling refers to the classification of assets associated with a system, identifying the possible attacks against these assets, the…
-
"2020 Forecast: Attackers Will Target Non-Traditional Systems"Researchers believe that API security is going to be a significant threat surface in 2020. The increase of using container ecosystem and the popularity of mobile apps that connect to backend services have pushed the microservices architecture to the…
-
"Texas School District Loses $2.3M to Phishing Attack"A new phishing attack has affected The Manor Independent School District (MISD), located roughly 15 miles outside Austin, Texas. MISD made three payments amounting to 2.3 million dollars. The school did not realize the bank account information got…
-
"Exploit Fully Breaks SHA-1, Lowers the Attack Bar"Researchers from INRIA in France and the Nanyan Technological University in Singapore developed a proof-of-concept attack that is capable of breaking the Secure Hash Algorithm-1 (SHA-1) code-signing encryption. The exploit developed by Gaetan Leurent and…
-
"A Case for Establishing a Common Weakness Enumeration for Hardware Security"Attacks on modern computers are growing more frequent, pervasive, and sophisticated because they are not only impacting the software layer but also the hardware layer. The industry is bolstering efforts to deliver microarchitectural improvements that…
-
"A Billion Medical Images Are Exposed Online, As Doctors Ignore Warnings"Security researchers from the Germany-based security firm Greenbone Networks discovered the exposure of a billion medical images online. The exposure of these images is the result of hospitals, medical offices, and imaging centers using unprotected…
-
"What Students Think About University Data Security"During a new study, researchers surveyed 1000 undergraduate students. The researchers discovered that 69 percent of students are concerned about how the education system protects their personal data. 65% of the respondents said that if a college had…
-
"Connected Cars Moving Targets for Hackers"The growth in connected vehicles creates opportunities for cyberattacks that pose a significant threat to the safety of drivers. The cybersecurity firm, GuardKnox, highlighted the danger in a demonstration at the recent Consumer Electronics Show in Las…
-
"U.S. Monitoring Cyberspace for Signs of Iranian Aggression"U.S. government officials are on the lookout for indicators of cyberattacks executed by Iran following the recent drone strike that killed Quds Force commander Qassem Soleimani. The Department of Homeland Security's latest advisory expressed that…
-
"Browser Zero Day: Update Your Firefox Right Now!"Researchers have found a flaw in Firefox 72 just two days after it was released. The issue researchers identified is called CVE-2019-17026. CVE-2019-17026 is a type confusion bug affecting Firefox’s IonMonkey JavaScript Just-in-Time (JIT) compiler…