News
-
"Dow Jones Data Exposed on Public Server"Dow Jones data was exposed on a public server. An "authorized third party" was blamed for not securely storing more than 2.4 million records of risky businesses and individuals on a public server without password protection. This is why…
-
"Hackers Can Spy on and Hijack Amazon Doorbell’s Video Feed"An investigation into the security of Amazon's Ring Doorbell revealed a vulnerability that could allow the video feed of the home security device to be hacked and spied on. A cybersecurity researcher at Dojo By BullGuard recently released details…
-
"'Thunderclap' security flaw in Thunderbolt spec could compromise USB-C and DisplayPort"The Thunderbolt connectivity specification has been found to contain a security flaw. According to a team of security researchers, the flaw called Thunderclap, could enable computers to be attacked through their USB-C or DisplayPort hardware. This…
-
"Exchanging Information Securely Using Quantum Communication in Future Fiber-Optic Networks"Quantum technology is expected to improve the security of communication channels. Researchers at the National Institute of Information and Communications Technology in Japan are conducting research in which they explore the possibility of performing…
-
"5 ways employees can weaken your cybersecurity defenses"Cyber security is becoming more important for businesses as more businesses become more dependent on using computers. It is critical to take cyber security seriously, and that has to begin with training staff on how to be careful of attacks. …
-
"Internet-Connected Mr. Coffee Machines Have Security Vulnerability, Mcafee Says"McAfee recently released information pertaining to the vulnerability of a connected coffee maker to being hacked. According to the security firm, the coffee maker produced by Mr. Coffee and Wemo contains a security vulnerability that could enable hackers…
-
"Researchers Break E-Signatures in 22 Common PDF Viewers"Researchers at Ruhr-University Bochum in Germany have revealed vulnerabilities in PDF document viewers that could allow attackers to alter documents without invalidating electronic signatures. Three different attacks that could be performed through the…
-
"TurboTax Users Hit by Credential Stuffing Attack"TurboTax users have been affected by a Credentail Stuffing Attack. The attack can allow an unathorized party to access ones acount and may obtain information contained in a prior year’s tax return or ones current tax return in…
-
"Lab Instruments May Be Leaking Patient Data, Study Finds"A study conducted by researchers at the University of California brings attention to the leaking of valuable information from lab instruments such as DNA synthesizing machines. According to researchers, the acoustic noise produced by a DNA synthesizer…
-
"Supermicro Hardware Weaknesses Let Researchers Backdoor an IBM Cloud Server"According to researchers at Eclypsium, the insecurity of baseboard management controllers (BMCs) poses a threat to the security of a premium cloud service provided by IBM, called bare-metal cloud computing. The vulnerabilities contained by BMCs could…
-
"Your Bionic Hand Is Now at Risk from Hackers"New research emphasizes the need to consider the cybersecurity of modern prosthetics such as bionic hands. Bionic hands developed by Moscow-based company, Motorica, provide smart features, which are connected to a remote cloud system. An examination of…
-
"Instagram data from 14 million profiles found in unsecured database, researcher says"Information about more than 14 million Instagram users accounts are being kept in an unsecured database. This could render Instagram users to be vulnerable to hackers. Cyberscoop reports: "Instagram data from 14 million…