News
  • "Novel Transmitter Protects Wireless Devices from Hackers"
    Researchers at MIT have developed an innovative new transmitter to prevent the compromise of wireless devices such as medical devices, wearables, and more, by hackers. The transmitter applies an ultrafast frequency-hopping method to protect data…
  • "VPNFilter Malware Impact Larger Than Previously Thought"
    Malware by the name of VPNFilter was previously reported to have infected at least 500,000 SOHO routers manufactured by Linksys, MikroTik, NETGEAR, and TP-Link, as well as NAS devices. Cisco Talos researchers have now discovered that the malware has…
  • "Police Figures Cite Cybercrime, Digital Data As Top Concern"
    Cybercrime has been cited as a top concern for police since most crimes now involve a digital element. The significant increase of digital data is raising concerns among police figures as more data further complicates the policing of cybercrime. This…
  • "US Government Probes Airplane Vulnerabilities, Says Airline Hack Is ‘Only a Matter of Time’"
    Presentations and risk assessments conducted by US government researchers reveal that an airline will eventually face a cybersecurity breach. Research surrounding the cyber vulnerabilities contained by a commercial aircraft highlights the lack of…
  • "Another Baby Monitor Camera Hacked"
    A FREDI wireless baby camera monitor was hacked in order to spy on a South Carolina mother and her infant. The incident emphasizes the lack of security implemented in the design and development of IoT devices, as well as the absence of security standards…
  • "Mirai Variants Continue to Spawn in Vulnerable IoT Ecosystem"
    Variants of the infamous Mirai IoT botnet have continued to emerge following the release of the botnet’s source code in 2016. Netscout's Arbor Security Engineering and Response Team (ASERT) conducted research on current Mirai variants, including Satori,…
  • "Auth0 Subdomain Flaw Puts Users at Risk"
    Security researcher Daniel Svartman of Imperva discovered a flaw in the subdomain naming system in Auth0, an identity-as-a-service that provides subdomain names for approximately 2000 customers. The flaw allows an attacker to use the same subdomain name…
  • "SS7 Routing-Protocol Breach of US Cellular Carrier Exposed Customer"
    DHS has recently warned of the tracking of US phone users by hackers through the abuse of the routing protocol known as Signaling System No. 7 (SS7). The exploitation of SS7 could allow hackers to track the geographical location of a user as well as…
  • "In War Against Botnets, Manufacturers Need to Step Up, Report Says"
    A new cyber report released by the Department of Commerce and Department of Homeland Security (DHS) emphasizes the importance of implementing stronger security into products during the development stage in order to mitigate the problem of botnets. The…
  • "To Pay Hackers’ Ransom Demands or to Invest in More Security?"
    NTT Security recently published its annual global Risk:Value Report to which 1,800 C-level executives and other decision makers from non-IT functions in different countries and industry sectors responded. According to the report, a third of global…
  • "Quantum Computers and the Unbreakable Lattice"
    Quantum computers are expected to render currently used encryption algorithms obsolete in the future. However, lattice cryptography has been proposed as an encryption method that can resist quantum computer attacks. This article continues to discuss…
  • "Face, Iris and Pulse Biometrics Close in on Fingerprint Tech"
    According to a market data report released by ABI Research called Biometric Technologies and Applications, biometric authentication systems based on face, iris, and pulse are expected to lower the market share of fingerprint technologies. Biometrics…