News
-
"Hackers Are Making Their Attacks Look like They Came from the Chinese Government"According to threat intelligence experts, there has been an increase in the use of false-flag operations by hackers to make cyberattacks appear to have been launched by Chinese hackers. As publicly available tools are often used in the attack operations…
-
"Computer Chip Vulnerabilities Discovered"Researchers from Washington State University have discovered vulnerabilities in the communications system of high-performance computer chips that could cause modern electronics to malfunction. These vulnerabilities were uncovered through the…
-
"Shamoon Malware Destroys Data at Italian Oil and Gas Company"The notorious data-wiping malware known as Shamoon has emerged again to target an Italian oil and gas company by the name of Saipem. The new variant of the Shamoon malware crippled ten percent of Saipem’s computer systems, most of which are located in…
-
"Telegram, WhatsApp and Signal Open to Side-Channel Attacks"A warning has been issued by Cisco's Talos security research group pertaining to the insecurity of encrypted messaging apps Telegram, WhatsApp, and Signal. According to researchers, these apps that have been claimed to encrypt messages in transit are…
-
"Cryptography Failure Leads to Easy Hacking for Playstation Classic"The recently released PlayStation Classic has already been found to be vulnerable to a hack that could allow non-PlayStation software and more PlayStation games to be added to the plug-and-play device. This hack is possible as a result of weak…
-
"Protecting Our Digital Heritage in the Age of Cyber Threats"The Australian Strategic Policy Institute (ASPI) recently released a report, which emphasizes the importance of protecting national records that hold information pertaining to births, deaths, taxes, marriages, and more, from being hacked. If such records…
-
NYT Article on Apps Sharing Location DataNew York Times has an investigative reporting article on the location sharing monitoring and sharing of data with mobile apps. It shows the use and detailed nature of the data. https://www.nytimes.com/interactive/2018/12/10/business/location-data-…
-
"Bug Bounty Hackers Bill Introduced into the U.S. Senate"A bill, called the Public-Private Cybersecurity Cooperation Act, has been proposed by a bipartisan pair of U.S. Senators. The aim of the bill is to require the creation of a vulnerability disclosure program by the Department of Homeland Security. The…
-
"Kubernetes Vulnerability Hits Top of Severity Scale"A major security vulnerability was recently discovered to be contained by the popular cloud container orchestration system, Kubernetes. The vulnerability could be exploited by authorized and unauthorized users to escalate privileges. This article…
-
"The Privacy Risks of Compiling Mobility Data"MIT researchers have conducted a new study that reveals the risks posed by the practice of compiling anonymized data consisting of location stamps to the privacy of users. Data from mobile phone records, Twitter accounts, and more, can be …
-
"Researchers Claim 400,000+ MikroTik Routers Infected With Mining Malware"According to researchers, more than 400,000 MikroTik routers have now been infected with cryptojacking malware that was first discovered in August. The cryptomining malware that mainly targeted MikroTik routers in Brazil, resulting in the infection of…
-
"ESET Discovers 21 New Linux Malware Families"ESET researchers have released details pertaining to the discovery of 21 new Linux malware families that are based on OpenSSH. The discovery of these Linux malware families calls for cybersecurity firms to pay more attention to Linux-focused malware.…