News
-
"Building Biologically-Inspired Software"Engineers in the Department of Electrical Engineering at the University of South Florida have developed new network protection software that is based on the human immune system. Researchers looked at the mechanisms of human immune system to see how they…
-
"Popular Video and Sound Editing Website VSDC Hacked to Propagate Banking Trojans"Security researchers at Doctor Web discovered the compromise of the popular video editing website, VSDC, by hackers. Download links on the VSDC website were hijacked in order to infect the video editing website with a banking Trojan (Win32.Bolik.2) and…
-
"Majority of Organizations Lack a Cybersecurity Incident Response Plan"Findings of a study on cyber resilience by IBM Security and the Ponemon Institute indicate that the majority of organizations do not have a cybersecurity incident response plan in place in the event that a cyber incident occurs. The implementation of…
-
"Majority of Hotel Websites Leak Guest Booking Info"New research conducted by Symantec reveals the leakage of detailed guest booking data by the majority of hotels to third-party advertisers, social media websites, and more. This data includes information such as names, addresses, mobile phone …
-
"Phishing Scheme Uses Legit Signup Forms to Steal Payment Card Data"Security researchers have found that cybercriminals are using signup forms for official newsletters from the websites of international companies to hide phishing attacks. According to researchers, these phishing emails can evade spam filters used by…
-
"New Super-Secure Wi-Fi Is Actually Full of Security Holes"Wi-Fi Protected Access 3 (WPA3) isn't as secure as it was proclaimed to be as researchers have uncovered critical design flaws in the Wi-Fi security and authentication standard. According to researchers, WPA3 is vulnerable to the same attacks that WPA2…
-
"Google's Making It Easier to Safeguard Sensitive Data Troves"Google's Data Loss Prevention (DLP) tool has the capability to perform scans of large amounts of data in the cloud in order to identify and redact the data that is sensitive. The tool is used in many Google products, but it can also be used by…
-
"Is AI In Cyber Security A New Tool For Hackers In 2019?"AI is being used more and more to help protect from cyberattacks. AI uses machine learning to enhance its intelligence. To improve cybersecurity, it fills the gap of lack of skills to prevent cyber attacks. While AI can improve…
-
"Framing Supply Chain Attacks"As software development teams are pressured to deliver applications in a short amount of time, they often turn to open source components, code reuse, and third-party integrations, thus increasing the vulnerability of applications to cyberattacks and…
-
"DNS hijacking campaigns target Gmail, Netflix, and PayPal users"There is a DNS hijacking campaign that has been ongoing for the past three months. Attackers are targeting the users of popular online services, including Gmail, Netflix, and PayPal. During the DNS hijacking, the hacker compromises …
-
"Cybersecurity Team at NAU Testing Ternary Computing to Secure Blockchain Technology for Cryptocurrency, Other Applications"A team of cybersecurity researchers at Northern Arizona University's (NAU) School of Informatics, Computing, and Cyber Systems, has been awarded a $125,000 grant by the U.S. Air Force Research Lab (AFRL) in support of work to strengthen the security of…
-
"A Powerful Spyware App Now Targets iPhone Owners"According to researchers at the mobile security firm, Lookout, the powerful surveillance app that was initially designed for Android devices, called Exodus, now targets iPhones. The developer of the malicious app was able to evade the Apple app store's…