News
  • "Hackers Bypassing Some Types of 2FA Security FBI Warns"

    It has been discovered by the FBI that some types of two-factor authentication (2FA) security can no longer be guaranteed to keep adversaries out.  Their are several methods cyber actors use to circumvent popular multi-factor authentication…

  • "Using Machine Learning to Hunt Down Cybercriminals"

    Researchers at MIT and the University of California at San Diego (UCSD) have developed a new machine-learning (ML) system that can be used to prevent IP hacking incidents before they occur by identifying serial IP hijackers. IP hijacking is a type…

  • "Twitter Admits It Used Two-Factor Phone Numbers and Emails for Serving Targeted Ads"

    Another incident has raised concerns over the misuse of customer data by social media giants. Twitter recently admitted to using phone numbers and email addresses provided by users to enable two-factor authentication on their accounts for targeted…

  • "A Controversial Plan to Encrypt More of the Internet"

    Google and Mozilla plan to encrypt a fundamental element of the Internet, the Domain Name System (DNS). Security was not considered in the design of DNS, allowing hackers to abuse weaknesses and vulnerabilities in the Internet system through a variety of…

  • "Majority of IT Departments Leave Major Holes in Their USB Drive Security"

    In a new study, it was found that even though 87% of organizations use USB drives, the majority of IT departments aren’t implementing tools to manage USB device usage. Nearly 6 out of 10 organizations (58%) do not use port control /…

  • "New Report Outlines IoT Security Vulnerabilities"

    A new Internet of Things (IoT) report released by consulting and research firm, Independent Security Evaluators (ISE), details the presence of IoT security vulnerabilities in 13 popular small office/home office (SOHO) routers and network-attached storage…

  • "Wireless Security Institute Established at Idaho National Laboratory to Improve 5G Technology"

    5G is the next generation of wireless technology that is expected to bring improvements in regard to bandwidth, capacity, and reliability. However, the arrival of 5G networks is also expected to introduce new security vulnerabilities. As the…

  • "Phishing Attempts Increase 400%, Many Malicious URLs Found on Trusted Domains"

    In a news study, it has been discovered that nearly a quarter (24%) of malicious URLs are found to be hosted on trusted domains.  This is done, because hackers know trusted domain URLs raise less suspicion among users and are more…

  • "New Tech Aims to Tell Pilots When Their Plane Has Been Hacked"

    U.S. defense contractor, Raytheon, is developing new technology that would alert pilots in the event that their planes are being hacked. The U.S. military expects the act of hacking a plane to be a major tactic in warfare in the future. The Cyber Anomaly…

  • "Hacking for the Public Good"

    A panel at the Black Hat USA 2019 conference highlighted the use of hacking skills for good as hacking is often perceived as bad. It was emphasized that white-hat hackers and IT security industry groups are applying their skills in a way that bolsters…

  • "APT Groups Exploiting Flaws in Unpatched VPNs, Officials Warn"

    The National Security Agency (NSA) and the National Cyber Centre (NCSC) in the United Kingdom issued alerts pertaining to the exploitation of vulnerabilities in outdated VPN technologies from Pulse Secure, Fortinet, and Palo Alto Networks by state-…

  • "Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure"

    A researcher known as Wojciech used open source intelligence (OSINT) and a tool that he developed, called Kamerka, to demonstrate the ease at which adversaries can collect intelligence on U.S. critical infrastructure. Through the use of the Kamerka tool…