News
-
"Fortnite Had a Security Vulnerability That Let Hackers Take over Accounts"Security researchers at Check Point discovered vulnerabilities contained by the Epic Games' website that could have allowed hackers to hijack the accounts of Fortnite gamers. The unauthorized access of Fortnite accounts would have enabled the…
-
"As the Government Shutdown Drags on, Security Risks Intensify"Federal departments and agencies, including the Department of Homeland Security, Environmental Protection Agency, and more, may be at an increased risk of experiencing cybersecurity breaches due to the current partial government shutdown. Cybersecurity…
-
"New Side-Channel Attack Steals Data from Windows, Linux Page Cache"Researchers have published a paper, titled "Page Cache Attacks", in which a new software side-channel attack is detailed. The new attack can be launched against Windows and Linux, targeting the page cache of these operating systems to steal…
-
"Tesla’s Model 3 Will Be the Prime Target at Upcoming Hacker Contest"Pwn2Own is a hacking contest in which ethical hackers are encouraged to find vulnerabilities in programs. An upcoming Pwn2Own contest in Vancouver will focus on the Tesla Model 3. Tesla welcomes security researchers to probe its …
-
"The Quiet Threat Inside ‘Internet of Things’ Devices"The number and utilization of Internet of Things (IoT) devices continues to increase at a rapid rate. However, the security of IoT devices remains insufficient, leaving such devices vulnerable to being taken over by hackers. This article continues…
-
"Phishing Attacks Bypass Two-Factor Authentication"Security researcher, Piotr Duszynski, has released a tool, called Modishka. Modishka is a penetration testing tool that can be used to simplify the execution of phishing campaigns. The tool can also be used by hackers to circumvent two-factor…
-
"Arm Yourselves for Healthcare’s Cybersecurity War"The U.S. healthcare industry continues to be one of the industries most targeted by hackers due to the large amount of sensitive data stored and exchanged by systems used within this industry. As a result, the U.S. Department of Health and Human Services…
-
"Why Security by Design and Security DevOps Are so Critical to Success"As technology continues to advance, there must be more consideration surrounding the security of technologies during their design. It is important that SecDevOps (Secure Development Operations) is further adopted by companies to ensure the implementation…
-
"Use Edge Computing for IoT Security, Says IEEE"IEEE (Institute of Electrical and Electronics Engineers) researchers call for the implementation of a new security framework aimed at securing the Internet of Things (IoT), which involves the use of edge computing. This security framework suggests the…
-
"Hacker Uses Early Warning System for Fake Message Campaign"Systems used by an Australian company, called the Early Warning Network (EWN), were recently infiltrated by a hacker. EWN provides alerts pertaining to severe weather, floods, bushfires, and more, to Australian citizens. The compromise of systems used by…
-
"To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers"Recent claims surrounding the infiltration of the U.S. technology supply chain by China's military to conduct espionage call for public and private sector organizations to take further action to reduce IT supply chain risks. Organizations are urged to…
-
"Blockchains in Real Time"Sebastian Faust, Professor of Applied Cryptography, and his team of cryptography researchers at Darmstadt University of Technology are working to improve the performance of blockchain transaction processing while also ensuring the security of blockchain…