News
-
"New Vulnerability Risk Model Promises More-Efficient Security"Michael Roytman, chief data scientist at Kenna Security, and Jay Jacobs, a security data scientist at the Cyentia Institute, gave a presentation at the 2019 Black Hat security conference in which they discussed a Predictive Vulnerability Scoring System.…
-
"Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons"Matt Wixey, the cybersecurity researcher lead at PWC UK, has demonstrated that it is possible for hackers to weaponize speakers such as Bluetooth speakers, parametric speakers, vibration speakers, and more. According to Wixey, custom malware can easily…
-
"These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer"Security researchers have discovered that it is possible to hack a computer through the use of a malicious tool, called the O.MG Cable, which is a modified Apple lightning cable. According to researchers, the O.MG cable appears legitimate because it…
-
"Hacking One of the World's Most Secure Industrial Programmable Logic Controllers (PLC)"A team of researchers from the Technion - Israel Institute of Technology and Tel Aviv University, together with the Israel National Cyber Directorate have demonstrated an attack on a Siemens programmable logic controller (PLC) that could allow for the…
-
"More Than 2m AT&T Phones Illegally Unlocked by Bribed Insiders"It has been discovered that between 2012 and 2017, an individual recruited AT&T employees at the company’s call center in Bothell, Washington, to plant malware and misuse the company's computer networks to illegally unlock phones. To…
-
"Security Researchers Find That DSLR Cameras Are Vulnerable to Ransomware Attack"Security researchers at Check Point have released a new report, detailing the vulnerability of digital DSLR cameras to being hit by ransomware attacks. According to a researcher, named Eyal Itkin, malware could be delivered to these cameras through the…
-
"Attackers’ Growing use of Anti-Analysis, Evasion Tactics Pose a Challenge to Enterprises"It has been dicovered that it is becoming harder for organizatioins to detect malware. Many modern malware tools are now incorporating features for evading antivirus or other threat detection measures, but cyber adversaries are becoming more…
-
"Yet Another Hacking Group Is Targeting Oil and Gas Companies"A new hacking group, dubbed Hexane, has been discovered by the industrial security company, Dragos. The newly discovered hacking group targets telecommunications, oil, and gas companies in the Africa, Central Asia, and the Middle East. Hexane is one of…
-
"Tablet for Kids Had Flaws That Exposed Info, Location"The LeapPad Ultimate is a tablet designed for children between the ages of 3 and 6 that has recently been discovered by researchers from Checkmarx to be vulnerable to hacking. According to researchers, the tablet contains flaws that could be…
-
"Researchers Show Vulnerabilities in Facial Recognition"Research conducted by Yu Chen, Bin Ma, and Zhou (HC) Ma at Tencent Security's Zuanwu Lab explored the implementation and defense mechanisms of biometric authentication. One of the researchers performed a demonstration at Black Hat USA 2019 in which they…
-
"U.S. Utility Firms Hit by State-Sponsored Spear-Phishing Attack"Three U.S. utility companies were the targets of a spear phishing campaign in which new malware, called LookBack, was used. The spear phishing emails sent to these companies appeared to be from a U.S.-based engineering licensing board. However, once the…
-
"New SWAPGS Side-Channel Attack Bypasses Spectre and Meltdown Defenses"Researchers from the security firm, Bitdefender, have demonstrated a new side-channel attack similar to that of Spectre and Meltdown, called SWAPGS. The attacks could be performed through the abuse of modern CPUs' speculative execution capabilities,…