News
-
"Attackers Can Track Kids’ Locations via Connected Watches"Researchers from Pen Test Partners recently discovered the vulnerability of kid's GPS-tracking Gator watches to being used by attackers to gain access to sensitive information about the children using these watches. 35,000 children are impacted by this…
-
"Hackers Are Passing Around a Megaleak of 2.2 Billion Records"A collection of 2.2 billion unique usernames in conjunction with their associated passwords is being shared among hackers via forums and torrents. This collection of data has been reported to come from previous data breaches faced by Dropbox, LinkedIn,…
-
"New Security Flaw Impacts 5G, 4G, and 3G Telephony Protocols"The upcoming 5G cellular mobile communications protocol has been discovered by researchers to contain a security gap that could be exploited by attackers to allow the monitoring of users' texts, location, and more. This security gap is associated…
-
"New APT Goes After Individual Targets by Hitting Telecom, Travel Companies"A new advanced persistent threat (APT), called APT39, supposedly linked to Iran has recently been identified by researchers at FireEye. The cyber espionage group, APT39, has been reported to be concentrated on gathering data from companies within the…
-
"Mac Malware Steals Cryptocurrency Exchange Cookies, Text Messages for 2FA Authentication"New Mac OS malware, called CookieMiner, has been detailed by Palo Alto Networks' Unit 42 security research team. According to researchers, CookieMiner targets web browsers, Chrome and Safari, in an attempt to steal cryptocurrency exchange and wallet…
-
"Quantum Internet Can Offer Virtually Unbreakable Encryption"A step towards a quantum secure internet has been made by Professor Hoi-Kwong Lo from the University of Toronto and his team of engineering researchers. The researchers are working to develop all-photonic quantum repeaters, which will help in the success…
-
"Researchers Try Pretence to Beat Cyberattacks"Researchers at the University of Missouri have developed a new artificial intelligence (AI) system for the purpose of improving upon the protection of digital information stored in the cloud against cyberattacks. The researchers have applied the…
-
"A New Method to Detect False Data Injection (FDI) Attacks"A solution to detecting false data injection (FDI) attacks targeting critical infrastructure such as electric grids has been proposed by researchers at Beijing Institute of Technology (BIT). The method proposed by researchers involves the use of a…
-
"Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices"Researchers with Dark Cubed and Pepper IoT have reported the vulnerability of IoT devices, including smart cameras, smart plugs, and security systems, to having security and privacy issues. According to the researchers, these devices have security and…
-
"Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing"Former Federal Trade Commission chief technologist, Ashkan Soltani, calls for tech companies to pay as much attention to the abusability of their products as they do to the security of the technology. In the examination of abusability, companies must…
-
"GDPR-Ready Organizations See Lowest Incidence of Data Breaches"Findings of Cisco’s 2019 Data Privacy Benchmark Study highlight the benefits seen by businesses when they invest in good privacy protections. The study found that GDPR-ready organizations experience less data breaches, have shorter system downtimes, and…
-
"Better Safeguards for Sensitive Information"Researchers have conducted a study aimed at improving the lower boundary of the quantum key distribution (QKD) encryption channel in order to enhance the secret key capacity. The study concentrated on the noisy thermal amplifier channel. This article…