News
-
"Why Local Governments Are a Hot Target for Cyberattacks"Cyberattacks against local governments have been on the rise as indicated by the recent wave of ransomware attacks faced by municipalities within the U.S. Security experts have provided reasons as to why local governments have become an attractive target…
-
"Employees are aware of USB drive security risks, but don’t follow best practices"In a study that was conducted, employees were found to be aware of the risks associated with inadequate USB drive security. It was found that while 91 percent of respondents claimed that encrypted USB drives should be mandatory, 58 percent of…
-
"Intel CPUs Impacted by New Zombieload Side-Channel Attack"A team of researchers have recently disclosed a new side-channel attack, called Zombieload. This attack is of the same category as Meltdown, Spectre, and Foreshadow in that it also abuses the speculative execution capabilities of modern CPUs to gain…
-
"Design Flaws Create Security Vulnerabilities for 'Smart Home' Internet-of-Things Devices"Flaws in the design of smart home Internet of Things (IoT) devices have been discovered by researchers at North Carolina University. The discovery of these design flaws is shared in a paper, titled Blinded and Confused: Uncovering Systemic Flaws in…
-
"WhatsApp flaw used to install spyware by simply calling the target"A security vulnerability in the popular Facebook-owned end-to-end encrypted messaging app WhatsApp allowed attackers to install spyware on smartphones without any user interaction or knowledge. WhatsApp discovered the vulnerability in early May, and…
-
"Flaws in a Popular GPS Tracker Leak Real-Time Locations and Can Remotely Activate Its Microphone"Security vulnerabilities have been discovered in a popular GPS tracker used to monitor children, track vehicles, and send alerts pertaining to elderly patients. The white-label location tracker is manufactured in China and is sold by companies, including…
-
"Hackers Still Outpace Breach Detection, Containment Efforts"Reports recently released by security researchers, including the Trustwave 2019 Global Security Report and the FireEye 2019 Mandiant M-Trends Report, indicate that there has been an improvement in the discovery and containment of data breaches as…
-
"Three Ways GDPR Benefits US Companies"The European Union's General Protection Regulation (GDPR) went into effect on May 25, 2018. The purpose of the GDPR is to ensure the protection of personal data belonging to EU residents by enforcing a standard upon any companies that manage this data.…
-
"Despite warnings, most people still don’t change their passwords"1050 individuals were surveyed about their passwords. It was discovered that 64% of people used the same password for some, or even all, of their online accounts, while only 21% used a different password for each account. 21% of the…
-
"Artificial Intelligence May Not 'Hallucinate' After All"Great advancements have been made in machine learning in regard to image recognition as this technology can now identify objects in photographs as well as generate authentic-looking fake images. However, the machine learning algorithms used by image…
-
"This Ransomware Sneakily Infects Victims by Disguising Itself With Anti-Virus Software"According to cybersecurity researchers at Trend Micro, ransomware, called Dharma, which emerged in 2016, has been updated to deceive users into installing it by posing as anti-virus software. New details pertaining to the updated version of Dharma…
-
"Study Finds Wi-Fi Location Affects Online Privacy Behavior"A team of scientists conducted a study to see if a person's location offline affects how they behave online in regard to privacy. The study also explores changes in online privacy behavior resulting from the presence of a virtual private network (VPN)…