News
-
"Meltdown-Like 'LazyFP' Vulnerability Impacts Intel CPUs"A new speculative execution side channel vulnerability called LazyFP has been discovered to affect most Intel Core processors. The flaw related to the floating point unit (FPU) could be exploited by attackers to gain unauthorized access to sensitive…
-
"Connected Cars Vulnerable to Cyberthreats"Researchers have further highlighted the vulnerability of connected cars to cyberattacks. The addition of new features and functions to a connected car creates digital security risks and vulnerabilities. This article continues to discuss the…
-
"MysteryBot Android Trojan Aims at Banking Apps"A new type of malware called MysteryBot has been discovered by security researchers at Threat Fabric to be targeting banking applications. According to researchers, MysteryBot launches a banking Trojan, key logger, and ransomware. MysteryBot also…
-
"Researchers Investigate Potential Threat to Speech Privacy via Smartphone Motion Sensors"A study conducted by researchers at the University of Alabama at Birmingham suggests that the security vulnerabilities contained by smartphone motion sensors such as accelerometers and gyroscopes could be exploited by cybercriminals to record a user’s…
-
"DHS Cyber Specialist: Look for Behavior Patterns with APTs"Casey Kahsen, an IT specialist at DHS, emphasizes the importance of looking at human behavior patterns in order to track advanced hacking groups. Examining the human behavior associated with an APT means observing operational hours or coding style. This…
-
"Why 50,000 Ships are so Vulnerable to Cyberattacks"The shipping industry has been behind in considering regulations that address cybersecurity. A recent demonstration performed by cybersecurity experts further shows the inadequate cybersecurity of the shipping industry. This article continues to…
-
"Blockchain All the Rage But Comes With Numerous Risks"McAfee's Advanced Threat Research Team explored four types of vectors that could be used by cybercriminals to attack the blockchain. These attack vectors include phishing, malware, blockchain implementation exploits, and blockchain technology…
-
"Poor Password Practices Put Corporate Cybersecurity at Risk"Recent studies highlight poor and careless password practices still being used by employees and the risk posed by such practices to the organizations in which they work. These studies show that basic cyber hygiene practices such as using two-factor…
-
"Claiming Credit for Cyberattacks"Political scientists at the University of Connecticut and the University of Pittsburgh conducted a study titled “Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution”. The study examines how an attacker makes the decision to admit…
-
"For Almost 11 Years, Hackers Could Easily Bypass 3rd-Party macOS Signature Checks"According to researchers, hackers have been able to circumvent the mechanism used by a number of macOS third-party security tools to check digital signatures for 11 years. Therefore, macOS malware could have easily been presented as apps signed by Apple…
-
"Embrace IT Modernization Without Creating Cybersecurity Risks"The modernization of information technology systems used by government agencies could improve upon the cybersecurity of such systems and decrease the occurrence of security breaches. However, government leaders must consider certain aspects in the effort…
-
"Extra Vigilance Required to Combat Growing Sophistication of Phishing Attacks"As phishing attacks continue to grow in complexity and sophistication, vigilance alone is no longer sufficient in the protection against such attacks. Researchers at Virginia Tech conducted a study in which they examined the security of email services…