News
-
"The Pentagon Is Exploring New Ways to Isolate Its Networks"General Electric was awarded a multimillion-dollar contract by the Defense Advanced Research Projects Agency under the Guaranteed Architecture for Physical Security (GAPS) program to develop prototypes of hardware and software designs in support…
-
"Security Hole Opens a Billion Android Users to Advanced SMS Phishing Attacks"A security flaw has been discovered in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. Researchers found that certain Samsung phones are the most vulnerable to this form…
-
"Website Rates Security of Internet-Connected Devices"Security researchers from the Georgia Institute of Technology and the University of North Carolina at Chapel Hill developed a website to help consumers understand the major security issues and risks associated with consumer-grade Internet of Things (IoT…
-
"Keeping High-Performance Computers Cybersecure"The Pacific Northwest National Laboratory's Center for Advanced Technology Evaluation (CENATE) recently sponsored a roundtable, which brought researchers from the realms of computer science and cybersecurity together to explore fundamental research…
-
"At Least 47,000 Servers Vulnerable to Remote Attack"Researchers at the security firm, Eclypsium, discovered the vulnerability of at least 47,000 Supermicro servers in 90 countries. According to researchers, these servers contain vulnerabilities in their baseboard management controller (BMC) firmware. The…
-
"Integrating EMM & APP Vetting Solutions for Maximum Security"The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) released a new study, titled Evaluating Mobile App Vetting Integration with Enterprise Mobility Management in the Enterprise. The study describes a continuous approach…
-
"Fileless Attacks Designed to Disguise Malicious Activity up 265%"It has been discovered that in 2019, there has been a surge in fileless attacks designed to disguise malicious activity. Detections of this threat were up 265% compared to the first half of 2018. Cryptomining malware …
-
"Cybersecurity Vendor That Protects Firms from Data Breaches Hit by Data Breach"Cybersecurity vendor, Imperva, recently disclosed information pertaining to the exposure of data belonging to its cloud firewall customers. The number of customers that have been impacted by this data breach has not been specified. The information…
-
"Websites Have Been Quietly Hacking iPhones for Years, Says Google"Security researchers at Google's Project Zero have brought attention to the presence of security flaws in iPhones that have allowed hacked websites to distribute malware to the devices for at least two years. According to researchers, the malware…
-
"New Botnet Targets Android Set-Top Boxes"Researchers at the device cybersecurity company, WootCloud, discovered a new internet-of-things (IoT) botnet, called the ARES ABD botnet. The IoT botnet targets Android set-top boxes produced by HiSilicon, Cubetek, Qezy Media, and other vendors. ARES…
-
"Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs"U.S. and French law enforcement with help from researchers at Avast took down a cryptomining worm, called Retadup. Law enforcement efforts resulted in the neutralization of 850,000 infections. The worm was discovered to be distributing XMRig, which is a…
-
"App Allows Inspectors to Find Gas Pump Skimmers Faster"Fraudsters use skimmers as a physical means to perform data theft. Skimmers are small devices that can be attached to a gas pump or an ATM's card reader to harvest credit and debit card numbers as users swipe their cards. These devices use Bluetooth to…