News
  • "New Bugs Leave Millions of Phones Vulnerable to Hackers"

    Research conducted by Kryptowire, which was funded by the Department of Homeland Security, reveals the presence of major security vulnerabilities in many phones sold by Verizon, AT&T, T-Mobile, Sprint, and other U.S.  cell phone carriers. The…

  • "Smart Cities Around the World Were Exposed to Simple Hacks"

    Smart city systems used in the management of traffic signals, water levels, and more, have been found to contain critical security vulnerabilities. Security researchers from IBM and Threatcare warn that attackers could exploit these vulnerabilities to…

  • "New Cyberattacks Against Urban Water Services Possible Warn Ben-Gurion University Researchers"

    Security researchers at Ben-Gurion University of the Negev (BGU) have warned of the possible execution of a botnet composed of smart irrigation systems against urban water services. According to researchers, the launch of a botnet consisting of smart…

  • "Researchers Help Close Security Hole in Popular Encryption Software"

    A fix for a security vulnerability contained by a popular security package has been proposed by cybersecurity researchers at the Georgia Institute of Technology. The exploitation of this security vulnerability by hackers could allow them to steal…

  • "New Method Simplifies Cracking WPA/WPA2 Passwords on 802.11 Networks"

    Jens Steube, developer of the password-cracking tool called Hashcat, has discovered a new way in which attackers can compromise routers that use WPA/WPA2 security and crack Wi-Fi passwords. Steube discovered this method during his examination of the WPA3…

  • "Could Deliberately Adding Security Bugs Make Software More Secure?"

    A new study published by researchers at New York University challenges the defense strategy in which flaws in software are eliminated before attackers find them. The researchers argue that a better defensive technique against the exploitation of software…

  • "The DNC Enlists Kids in Its Fight Against Hackers"

    The Democratic National Committee (DNC) has cosponsored a hacking competition aimed at strengthening the security of US election systems against hackers, which will be hosted by Def Con. The competition welcomes children from ages 8 to 16 to hack…

  • "Top 10 List of Dark Web Activities That Indicate a Breach"

    Research analysts at Terbium Labs have listed ten activities that are performed on the dark web, which suggest that a data breach or other cyber incident has occurred. These activities include the dumping of databases, leaking of source code, and more.…

  • "5 Ways to Improve Collaboration Among Security Professionals"

    It is important to strengthen collaboration between security practitioners in order to increase the sharing of cyber threat intelligence. The enhancement of information-sharing among security professionals would help in the advancement of security…

  • "Hacker Honeypot Shows Even Amateurs Are Going After ICS Systems"

    A honeypot experiment conducted by researchers from Cybereason brings attention to the targeting of industrial control systems (ICS) by less-skilled hackers. The infiltration of amateur hackers into such systems raises concerns as the mistakes made by…

  • "FBI in Smart Device Security Warning"

    The FBI has recently warned of the dangers posed by IoT devices when they are inadequately secured. The notice released by the FBI highlights the use of compromised IoT devices as proxies for cyber actors to preserve anonymity in the performance of…

  • "Improved Passphrases Could Make Online Experiences Both User-Friendly and Secure"

    Passphrases have been proven to offer a higher level of security than traditional passwords. However, human factors issues such as typos and memorability have hindered the widespread adoption of passphrases. Researchers, Kevin Juang and Joel Greenstein,…