News
-
"Excessive API Growth Puts Enterprise Security at Risk"The detection of the abuse of API access by malicious actors remains a major concern among security and IT professionals as indicated by the results of a survey conducted by Ping Identity. A large percent of security and IT professionals that…
-
"Hackers Testing New Reconnaissance Malware on Financial Institutions"According to Proofpoint researchers, the threat group known as TA505 has been testing new malware, called tRat, on commercial banks and other financial institutions. The remote access trojan allows hackers to perform reconnaissance. This article…
-
"Congress Passes Bill to Create New Federal Cybersecurity Agency"A bill has been passed by Congress, which aims to reorganize DHS’ National Protection and Programs Directorate (NPPD) into a Cybersecurity and Infrastructure Security Agency (CISA). The responsibilities of CISA include leading programs that protect…
-
"Unpatched Android OS Flaw Allows Adversaries to Track User Location"The Android mobile operating system contains a vulnerability that could be exploited by attackers to track the location of users. The vulnerability derives from the problem of cross-process information leakage. This article continues to discuss the…
-
"Researchers Created Fake 'Master' Fingerprints to Unlock Smartphones"Researchers at New York University and the University of Michigan have developed a technique to generate fake fingerprints that can deceive fingerprint scanners on smartphones. The fake fingerprints can be matched with a significant number of real…
-
"Researchers Discover Seven New Meltdown and Spectre Attacks"Seven new variations of the Meltdown and Spectre attacks that abuse speculative execution capabilities of modern CPUs have recently been revealed by a team of researchers. These new attacks affect AMD, Intel, and ARM processors. This article continues to…
-
"Google's First Android Security Transparency Report Highlights Dangers of Third-Party App Stores"Google recently released its first Android Ecosystem Security Transparency report, which brings further attention to the importance of downloading Android apps from the Google Play store instead of unofficial third-party stores. According to findings…
-
"Flaws in Roche Medical Devices Can Put Patients at Risk"Security vulnerabilities have been found in medical devices made by Roche. According to researchers, the vulnerabilities that they have discovered pose a threat to the well-being of patients as they affect blood glucose meters. This article continues to…
-
"Technique for Preventing Extraction of Finger Vein Patterns from Photographs"Fingerprint vein authentication has become a popular way in which users authenticate themselves at bank ATMs and on other systems. However, finger vein patterns have been found to be extractable via visible-light images. Researchers have developed a…
-
"Threat Actors Exploiting Red Team Tool JexBoss"A US-CERT alert has been issued by DHS' National Cybersecurity and Communications Integration Center (NCCIC) pertaining to the abuse of a red team tool by attackers, called JexBoss (JBoss Verify and EXploitation). Attackers are testing and…
-
"Iran May Launch Cyberattacks in Retaliation for New U.S. Sanctions"Iran is expected to launch increasingly hostile cyberattacks on its regional neighbors in response to new sanctions on its economy that have been imposed by the U.S. In addition to an increase in the execution of more aggressive cyberattacks, Iran is…
-
"Working from Anywhere, Keeping Your Files in Sync and Staying Secure"In an effort to increase productivity, many enterprises of today allow their employees to work remotely from home or in other locations such as hotels, coffee shops, and more. However, there are security precautions that employees should take when…