News
-
"How Kids Get into Hacking"A new study conducted by researchers from Michigan State University explores the characteristics and gender-specific behaviors that lead kids to juvenile hacking. Research has focused on the scope and threat posed by hacking. However, there is a lack of…
-
"URGENT/11: FDA Issues Alert for Cyber Vulnerability That Threatens Medical Devices, Networks"An alert has been issued by the U.S. Food and Drug Administration (FDA) for healthcare organizations, IT professionals, device manufacturers, and patients pertaining to a collection of security vulnerabilities, called URGENT/11, that affect connected…
-
"Blind Spots in AI Just Might Help Protect Your Privacy"Significant advancements have been made in machine learning (ML) as this technology has helped in detecting cancer and predicting personal traits. ML technology has also enabled self-driving cars and highly accurate facial recognition. However, ML models…
-
"WhatsApp Vulnerability Could Compromise Android Smartphones"Some new research has revealed that WhatsApp has a remote code execution (RCE) flaw. This flaw could be used to compromise not only the app but the mobile device the app is running on. The critical issue (CVE-2019-11932) affects…
-
"Alabama Hospitals Forced to Close After Ransomware Attack"Healthcare organizations are increasingly being targeted in ransomware attacks as indicated by recent attacks on hospitals in Alabama, Ohio, West Virginia, and the Australian state of Victoria. One recent ransomware attack has resulted in the closure of…
-
"Magecart Web Skimming Group Targets Public Hotspots and Mobile Users"Magecart is composed of multiple sophisticated hacking groups aimed at stealing credit card numbers through the performance of web-based card-skimming attacks. Security researchers from IBM's X-Force Incident Response and Intelligence Services team have…
-
"Preventing Manipulation in Automated Face Recognition"The adoption and implementation of automated face recognition continues to increase. However, this method of authentication remains vulnerable to morphing attacks in which different facial images are merged together to create a fake image. A photo stored…
-
"As Health Sector Grapples With Ransomware, a Search for Better Incident Data"In recent years, there have been a lot of ransomware infections, which have forced healthcare organizations across the U.S. to confront their security weaknesses. Yet largely missing from the equation has been a reliable and thorough…
-
"PDFex Attacks Can Exfiltrate Content From Encrypted PDF Documents"Researchers from Ruhr University Bochum and Munster University of Applied Sciences developed PDFex attacks that can be used to exfiltrate plaintext content from encrypted PDF documents. These attacks were successfully tested against 27 popular desktop…
-
"Legit-Looking iPhone Lightning Cables That Hack You Will Be Mass Produced and Sold"A security researcher created a tool called the O.MG cable, which is a modified Apple lightning cable capable of hacking a computer remotely. In addition to performing the normal functions of an Apple cable such as charging phones and transferring data,…
-
"Why AI Could Help in the Industrial Security Space"Industrial companies are increasingly turning to artificial intelligence (AI) technology to help bolster the cybersecurity of their critical infrastructure devices as cyberattacks against such infrastructure grows in frequency. The Norwegian aluminum…
-
"Apple iOS Has Permanent Bootrom Vulnerability"A new flaw has been discovered. The flaw enables bypassing the security protections present in most Apple mobile devices. While the vulnerability can't be patched, an attacker would need physical access to exploit it. The exploit,…