News
-
"Is Malware Heading Towards a WarGames-style AI vs AI Scenario?"As defense systems against cyberattacks continue to evolve with the help of artificial intelligence (AI) and machine learning (ML), cybercriminals alter their tactics to evade such systems. Cybercriminals are expected to use AI to make their malware…
-
"Consumers Believe Social Media Sites Pose Greatest Risk to Data"The results of a survey conducted by Gemalto to which 10,500 consumers responded, further indicate the impact that data breaches have on companies' reputation. Over 60% of those that participated in the survey expressed an avoidance of organizations that…
-
"New Cryptography Must Be Developed and Deployed Now, Even If Quantum Threats Are a Decade Away"Today's encryption algorithms are expected to be rendered obsolete by quantum computers in the future. A new report by the National Academies of Sciences, Engineering, and Medicine, emphasizes the importance of developing new cryptographic algorithms…
-
"Quora Discloses Major Breach That Affects 100 Million Users"A major data breach has recently been faced by the popular question-and-answer website, Quora, in which 100 million users have been affected. The information compromised by hackers includes names, email addresses, direct messages, encrypted passwords,…
-
"Citrix Security Boss Warns That Cryptojackers Are Exploiting Cloud Ignorance"As more companies depend more on cloud companies to store, monitor, and protect their data, there has been a rise in the targeting of companies’ cloud infrastructure to perform cryptojacking. Malicious activities such as cryptojacking usually go…
-
"New Attack Could Make Website Security CAPTCHAs Obsolete"A new AI algorithm has been developed by a team of researchers that could deem text-based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) security completely ineffective as the algorithm is able to quickly and…
-
"Top IoT Messaging Protocols Are Laughably Insecure, Trend Micro Research Shows"Research conducted by Trend Micro has brought further attention to the insecurity of messaging protocols used by IoT devices. The inadequate security of IoT messaging protocols, Message Queining Telemetry Transport (MQTT) and Constrained Application…
-
"Someone Is Claiming to Sell a Mass Printer Hijacking Service"Following a recent incident in which hackers took control of poorly secured printers to print messages aimed at promoting a popular YouTuber, a printer hijacking service is now being advertised. The service has been claimed to allow anyone to access…
-
Report on Fall 2018 Quarterly Science of Security and Privacy (SoS) Lablet MeetingNSA and Lablet researchers meet to discuss 2019 SoS Lablet research projects
-
"Faster Fuzzing Ferrets out 42 Fresh Zero-Day Flaws"A team of researchers has developed a better approach to performing fuzzing in order to find zero-day vulnerabilities in software faster. The fuzzer that has been improved upon by researchers is called American Fuzzy Lop (AFL), which falls into the…
-
"Marriott Data Breach Hits 500 Million Starwood Hotel Guests"Marriott, one of the largest hotel chains, has faced a data breach, which could affect 500 million guests that have made reservations for Starwood hotel brands, including Sheraton, Westin, and more. The data breached include names, addresses, passport…
-
"Anti-Botnet Guide Aims to Tackle Automated Threats"A new publication, called the International Anti-Botnet Guide, has recently been announced by the Council to Secure the Digital Economy (CSDE) and Consumer Technology Association (CTA). The objective of the guide is to assist organizations in the fight…