News
-
"Meet 'Simjacker,' a Nasty Mobile Vulnerability Researchers say Puts 1 Billion Phones at Risk"A research team has found an SMS-based hacking technique that actively is being exploited by a spyware vendor to track individual phone users. The attack is being dubbed “Simjacker,” and has ramifications for more than 1 billion…
-
NSA Launches Latest Codebreaker ChallengeBy Betsy Stein NSA/CSS Communications Officer FORT MEADE, MD, Sept. 20, 2019 — Are you a U.S. undergraduate or graduate student interested in attempting to crack a cyber-challenge similar to those that regularly threaten national security? Then sign…
-
NIST Releases Draft Security Feature Recommendations for IoT DevicesNIST Releases Draft Security Feature Recommendations for IoT Devices "Core Baseline" guide offers practical advice for using everyday items that link to computer networks. August 01, 2019
-
"Advanced Hackers Are Infecting IT Providers in Hopes of Hitting Their Customers"Researchers with the Symantec Attack Investigation Team recently discovered a new hacking group, called Tortoiseshell, which has infected 11 IT providers. According to researchers, the previously undocumented group uses custom and off-the-shelf hacking…
-
"Instagram Phish Poses as Copyright Infringement Warning – Don’t Click!"It has been discovered that there is a new phishing attempt going around that, tries to convince Instagram users, that they have gone against copyright laws. As in the previous case of Instagram phishing, the crooks are using a free .CF…
-
" Google Calendar Privacy Concerns Raised"A misconfiguration in a Google Calendar function that allows Google to index calendars, raises serious privacy concerns. It was discovered that over 8,000 Google calendars were publicly accessible and searchable using the Google…
-
"What to Expect From the NSA’s New Cyber Directorate"The National Security Agency (NSA) created a new unit aimed at defending the U.S. against foreign adversaries in cyberspace, which will go into effect on October 1, 2019. NSA's Cybersecurity Directorate will be under the leadership of Anne Neuberger who…
-
"Instagram Fixed After Researcher Finds Way to Link Account Info to PII"Instagram’s contact importer feature contained a vulnerability that could have allowed malicious actors to access account details and phone numbers using a brute-force algorithm and a network of bots. The information gathered through the exploitation of…
-
"Researchers Invent Cryptocurrency Wallet That Eliminates 'Entire Classes' of Vulnerabilities"Researchers from the Massachusetts Institute of Technology’s Computer Science and Artificial Intelligence Laboratory (MIT CSAIL) recently published a paper in which they present details on a new form of hardware wallet that they invented. Hardware…
-
"How Hackers Get Stuck In HADES"Sandia National Laboratory's High-fidelity Adaptive Deception and Emulation System (HADES) applies deceptive cybersecurity tactics to defend systems against hackers. HADES lures hackers into a simulated virtual environment in which defenders can track…
-
"Cyber-Security Incident at US Power Grid Entity Linked to Unpatched Firewalls"A recent report published by the North American Electric Reliability Corporation (NERC) discusses the cause of a cybersecurity incident that occurred earlier this year in which a U.S. power grid was impacted. According to the report, the incident only…