News
  • "ForeScout: Without Visibility and Control, OT Security Remains at Severe Risk"
    Further attention is being brought to the cybersecurity of operational technology (OT). Physical infrastructure is a way in which cybercriminals can infiltrate an enterprise network. OT systems are now more connected to the internet and joined with IT…
  • "Vulnerability of Cloud Service Hardware Uncovered"
    Scientists at Karlsruhe Institute of Technology (KIT) have discovered that field-programmable gate arrays (FPGAs) are vulnerable to side-channel attacks. FPGAs are often considered for use in the development of new systems because of the modifiable…
  • "APPLE JUST PATCHED A MODEM BUG THAT'S BEEN IN MACS SINCE 1999"
    A modem configuration bug has been discovered, that's been in Apple operating systems since 1999. The flaw could have potentially been exploited by an attacker to get persistent, remote root access to any Mac. Only certain generations of OS X and macOS…
  • "Unsecured Database Exposes 85GB in Security Logs of Major Hotel Chains"
    Researchers at vpnMentor discovered an unsecured database that exposed 85.4GB of major hotel chains' security logs. The exposure of security audit logs could lead to the exposure of cybersecurity weaknesses contained by major hotels, including Marriott.…
  • "Unknowingly Loading Malicious Content from 'Trusted' Sites"
    Findings from a study conducted by researchers from CSIRO's Data61, an arm of Australia's national science agency specializing in data and digital technology, reveals that about half of the Internet's most visited websites are vulnerable to being used…
  • "Checkers, Rally's Burger Joints Hit By POS Malware"
    Checkers Drive-In Restaurants, which also runs Rally's, had 102 of its 900 U.S. locations affected with a point-of-sale malware, with one California restaurant infected over more than two years, starting in December 2015.  The point-…
  • "Secure Metropolitan Quantum Networks Move a Step Closer"
    A team of Chinese researchers have made an advancement in quantum communication in which they performed continuous-variable quantum key distribution (CV-QKD) over commercial fiber networks at a significantly longer transmission distance than previously…
  • "From Viruses to Social Bots, Researchers Unearth the Structure of Attacked Networks"
    Researchers are looking at how viruses interact with proteins and genes in the human body in order to further understand how to combat cyberattacks on computer networks as well as other adversarial attacks in fields such as ecology, social science,…
  • "CSL Researchers Add ‘Time-Travel’ Feature to Solid State Drives to Fight Ransomware Attacks"
    In a paper, titled Project Almanac: A Time-Traveling Solid State Drive, researchers from the Coordinated Science Laboratory at the University of Illinois describe a tool that can allow victims to save their files in the event that they experience a…
  • "Chinese database exposes 42.5 million records compiled from multiple dating apps"
    Tens of millions of records about users of different dating apps have been discovered on a single database which does not require a password to access.  Most of the records discovered had information about American users,the…
  • "Texas Passes First Grid Protection Bills to Boost Cybersecurity Monitoring and Best Practices"
    Two grid protection bills, Senate Bill 475 and Senate Bill 936, were recently passed by Texas lawmakers. These bills are in support of improving upon the sharing and implementation of best security practices and creating a framework for collaboration in…
  • "Web App Vulnerabilities Flying Under Your Radar"
    Shandon Lewis, a senior Web application penetration tester at Backward Logic gave a presentation, titled Vulnerabilities in Web Applications That Are Often Overlooked, in which he highlighted the importance of concentrating on small Web application…