News
-
"Facebook’s Bug Bounty Gets Bigger for Third-Party Apps"In an effort to improve Facebook’s security and privacy, the social media giant will enhance its bug bounty programs by allowing security researchers to actively search for vulnerabilities in third-party apps and websites that integrate with its platform…
-
"New Cryptomining Malware Uses WAV Audio Files to Conceal Its Tracks"Security researchers from Cylance have discovered the use of a steganography technique in a new campaign aimed at distributing cryptomining malware. Steganography is a technique that can be used by hackers to covertly deliver malware in or by way of…
-
"Silent Librarian Retools Phishing Emails to Hook Student Credentials"The threat group known as Silent Librarian, TA407, or Cobalt Dickens, has been discovered to be using new tactics in an updated phishing campaign. Silent Librarian targets university students to steal student login credentials. According to researchers…
-
"A new Mac Malware Dubbed Tarmac has Been Distributed via Malvertising Campaigns"It has been discovered that malvertising campaigns are distributing MacOS malware combining both Shlayer and Tarmac malware. The malvertising campaigns have targeted users located in the US, Italy, and…
-
"FIN7 Gang Returns With New Malicious Tools"The financially-motivated hacking group, FIN7, is back with new malicious tools. FIN7 hackers are known for targeting businesses, including fast-food restaurants, hotels, and casinos for the purpose of stealing payment data such as credit card numbers.…
-
"Beyond Testing: The Human Element of Application Security"According to Veracode's recent State of Software Security (SOSS) report, the analysis of results from more than 700,000 applications scans revealed that 83 percent of the applications contained one or more vulnerabilities. These results call for the…
-
"Protecting Smart Machines From Smart Attacks"A team of researchers at Princeton University conducted studies on how adversaries can attack machine learning models. As the application of machine learning grows, it is important that we examine the different ways in which this technology can be…
-
"Fake Mobile app Fraud Tripled in First Half of 2019"During a study of Quarter 2 of 2019, RSA Security identified 57,406 total fraud attacks worldwide. Of these, phishing attacks were the most prevalent (37%), followed by fake mobile apps (usually apps posing as those of popular brands).…
-
"How Do We Ensure GNSS Security Against Spoofing?"The Global Navigation Satellite System (GNSS) refers to satellite navigation systems that provide positioning, navigation, and timing (PNT) services with global coverage. If the GNSS suffered a major outage for one day, it would cost the U.S. an…
-
"Mathematicians Prove That Flash-Memory 'Fingerprints' of Electronic Devices Are Truly Unique"Mathematicians at RUDN University have proven that the defects in flash memory cells can be used as fingerprints for memory chips. This method will strengthen the security of electronic devices against hacks. The growth of devices such as smartphones,…
-
"AI Development has Major Security, Privacy and Ethical Blind Spots"In a new study, it has been discovered that the most serious blind spot during AI development is security. Nearly three-quarters (73%) of respondents in the study, indicated they don’t check for security vulnerabilities…
-
"NAU Cyberengineering Team Wins $6M Grant to Develop Computing Solutions to Combat Cyberattacks"The U.S. Air Force has awarded a $6.3 million grant to a team of researchers at Northern Arizona University. The grant was given to support the development of novel solutions to the growing sophistication and frequency of cyberattacks as well as the…