News
-
"New Variant of Mirai Malware Exploits Weak IoT Device Passwords to Conduct Brute-Force Attacks"Security researchers at Trend Micro have uncovered a new variant of Mirai malware, called Miori. Miori is delivered through the exploitation of a remote code execution (RCE) vulnerability contained by the ThinkPHP programming framework. This article…
-
"Five Emerging Cyber-Threats to Worry About in 2019"2018 was an eventful year in regard to cybersecurity disasters such as large-scale data breaches, ransomware attacks, and the discovery of major security vulnerabilities contained by microchips. There are new threats that cyber defenders should be…
-
"From Encrypting the Web to Encrypting the Net: 2018 Year in Review"Great improvements were made in 2018 pertaining to web encryption. A significant number of websites have adopted HTTPS (Hyper Text Transfer Protocol Secure) due to the efforts of the Electronic Frontier Foundation (EFF), Google, and more. EFF will…
-
"Hacking Attacks on Your Router: Why the Worst Is yet to Come"Attacks on home and office routers are expected to increase in complexity and severity. Users are encouraged to update their router firmware, change default passwords, and more. This article continues to discuss notable attacks on routers in 2018,…
-
"PewDiePie Hackers Take Aim at Chromecast TVs"The two hackers that were able to hijack poorly secured printers to print messages aimed at promoting a popular YouTuber are now targeting Chromecast TVs. Routers with the Universal Plug and Play (UPnP) protocol enabled were exploited to take…
-
"Proofpoint Warns of Custom Web Font Phishing Technique"A new technique has been discovered by researchers at Proofpoint, which allows phishing web pages to go undetected. Custom web font files can be used by cybercriminals in the creation of phishing web pages to apply a substitution cypher, which can…
-
"University of Maryland Researchers Beat Google’s reCaptcha Audio Challenge"Researchers from the University of Maryland were able to defeat Google's reCaptcha audio challenge through the use of a tool that they have created, called unCaptcha 2. The audio challenge presented by the security feature was broken by researchers…
-
"Newspaper Production Hit by Ryuk Ransomware Attack"Ryuk ransomware is suspected to be behind the disruption of the production of major U.S. newspapers. The ransomware impacted the delivery and printing of newspapers owned by Tribune Publishing. This article continues to discuss the cyberattack that…
-
"Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3"Security researchers have demonstrated the vulnerability of cryptocurrency wallets, including include Trezor One, Ledger Blue, and Ledger Nano S, to being hacked. According to the researchers, the vulnerabilities contained by these cryptocurrency…
-
"USB Type-C to Become More Secure With Authentication Standard"The USB Type-C Authentication Program aims to improve upon the security of USB-based connections and devices. The program uses cryptography to validate the authenticity of USB Type-C devices in order to prevent the infection of vulnerable systems by…
-
"The Worst Hacks of 2018"Wired has highlighted the major hacks that have occurred in 2018. The highlighted hacks include those that have been faced by Marriott, Facebook, and more. This article continues to discuss the top 9 hacking incidents of 2018, which emphasize the…