News
-
"Software Developers Face Secure Coding Challenges"DevOps service provider, GitLab, conducted a survey aimed at highlighting trends that are impacting developers to which 4,000 developers, managers, and executives at software-producing companies responded. The results of the survey reveal a disparity…
-
"Supply Chains May Pose Weakest Security Link"Vulnerabilities in the U.S. military supply chain are being exploited by adversaries to execute attacks aimed at stealing valuable technical data, damaging critical infrastructure, gaining access to connected systems, degrading systems, and more. It has…
-
"Hack Brief: A Card-Skimming Hacker Group Hit 17K Domains—and Counting"Magecart is made up of sophisticated hacking groups that perform web-based card-skimming attacks to steal credit card numbers. The threat detection firm, RiskIQ, released a new report, which reveals the scanning of misconfigured Amazon S3 buckets by…
-
"How can Attackers Abuse Artificial Intelligence?"In a study on how attackers can abuse artificial intelligence a few things were discovered. It was discovered that adversaries will continue to learn how to compromise AI systems as the technology continues to spreads. The number of ways…
-
"WhatsApp, Telegram Had Security Flaws That Let Hackers Change What You See"Security researchers from Symantec have discovered a vulnerability contained by popular encrypted messaging applications, WhatsApp and Telegram. The exploitation of this vulnerability could enable the modification of images and audio files by hackers.…
-
"Dutch Researchers Are Developing Quantum Technology to Secure Your Bank Account"According to researchers, quantum computers will deem current encryption algorithms obsolete as such computers will contain quantum-mechanical properties that could allow them to perform calculations much faster than regular computers. Therefore, the…
-
"Academics Steal Data From Air-Gapped Systems via a Keyboard’s LEDs"Security researchers at Ben-Gurion University have demonstrated that it is possible for data to be extracted from secure air-gapped computers by attackers, using the Caps Lock, Num Lock, and Scroll Lock LEDs on a keyboard. The attack, called CTRL-ALT-LED…
-
Apple Quietly Removes Zoom’s Hidden web Server From MacsIt was discovered that Zoom, whose web conferencing software has more than four million users across desktop and mobile platforms, including Windows has multiple vulnerabilities. The vulnerabilities that were discovered include: CVE-2019-…
-
"Cybersecurity Training Study Reveals Phishing Identification and Data Protection Are the Top Problem Areas for End Users"Proofpoint has released its fourth annual report on end users' understanding of different cybersecurity topics and best practices, titled Beyond the Phish. The report reveals that employees are still inadequately knowledgeable about phishing and data…
-
"Researchers Detail Privacy-Related Legal, Ethical Challenges With Satellite Data"Satellite technology offers a number of benefits, such as clearer communications, accurate location information, faster emergency responses, and more. However, researchers at Penn State University are emphasizing the dangers posed to national security…
-
"Research Shows Humans Are Attacking Artificial Intelligence Systems"A research group led by De Montfort University Leicester (DMU) has brought further attention to the increased manipulation of artificial intelligence (AI) software in search engines, social media platforms, and more, by online hackers to execute…
-
"More than 2 million cyber incidents in 2018 created $45 billion in losses"In 2018, the financial impact of ransomware rose by 60%, losses from business email compromise doubled, and cryptojacking incidents more than tripled, even though the overall amount of breaches and exposed records were down in 2018. This data shows…