News
  • "Malvertising Campaign Abducts Half a Billion Chrome on iOS Sessions to Push Fake Ads"
    Confidant, an IT security firm, recently published a blog post in which the details of a malvertising campaign, dubbed eGobbler, are presented. According to researchers, eGobbler, abused a vulnerability in Chrome for iOS. Through the exploitation of this…
  • "Army Researchers Identify New Way to Improve Cybersecurity"
    Cyberattacks pose a significant threat to the security and privacy of individuals, government agencies, and businesses, making cybersecurity one of the biggest concerns of the nation. A new way in which network security can be improved has been…
  • "Cloud Security Spending Set to Top $12bn by 2023"
    A greater amount of companies are starting to use cloud services.  Organizations spent $178 billion on public cloud services last year, and the amount of money spent on public cloud services is expected to grow to $236 billion by…
  • "Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support"
    Microsoft has confirmed that some of its email service users were the targets of an attack sometime between January 1st and March 28th. Hackers were able to access the contents of users' email accounts through the abuse of Microsoft's customer…
  • "Researchers in Singapore Demonstrate New Quantum Key Distribution Technique over Singtel's Fibre Network"
    A breakthrough in quantum key distribution (QKD) has been made by a team of researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. QKD differs from traditional encryption in that it is uses the laws…
  • "Experts Explore Mystery of Security Metrics"
    The AFCEA Cyber Committee explored the area of security metrics by surveying and interviewing organizations with cybersecurity programs. The results from these surveys and interviews further highlight that measuring the adequacy of cybersecurity…
  • "New Attacks (and Old Attacks Made New)"
    In todays world new malware and zero-day attacks are reasonably rare and are vastly outnumbered by reconfigured malware and the regular return of old attacks.  It is important to be prepared for the new attacks, however it is also very important to…
  • "Aftershock-3PC: Polymorphic Malware Attack on 200+ Premium Publishers"
    A new form of malware targeting ad networks, called AfterShock-3PC, is said to have been designed to circumvent signature-based detection in that it continuously alters its identifiable features. According to the Digital Security and Operations (DSO)…
  • "TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids"
    Researchers at Pen Test Partners have uncovered vulnerabilities contained by a popular Australian smartwatch for kids, called TicTocTrack. Parents can track the location of their children via the smartwatch. According to researchers, the vulnerabilities…
  • "Privacy 'Poisoning' Poses Threat to Companies Using Blockchain"
    Blockchain technology can be made unusable through the launch of a privacy poisoning attack. A privacy poisoning attack is a new kind of cyberattack that can be performed by loading private data such as names, home addresses, credit card numbers, and…
  • "Cyber security – should your business be worried?"
    Every business no matter how big or small relies on computers and digitalization to perform their basic functions.  If a company is breached, then it can cost a lot of money for the company to fix and mitigate the affect of the attacks. Every…
  • "DHS Alerts Industry to Insecure Enterprise VPN Apps"
    The Department of Homeland Security (DHS) recently issued an alert to the public pertaining to the presence of a vulnerability in virtual private network (VPN) applications made by Cisco, F5 Networks, Palo Alto Networks, and Pulse Secure. According to…