News
-
"SS7 Routing-Protocol Breach of US Cellular Carrier Exposed Customer"DHS has recently warned of the tracking of US phone users by hackers through the abuse of the routing protocol known as Signaling System No. 7 (SS7). The exploitation of SS7 could allow hackers to track the geographical location of a user as well as…
-
"In War Against Botnets, Manufacturers Need to Step Up, Report Says"A new cyber report released by the Department of Commerce and Department of Homeland Security (DHS) emphasizes the importance of implementing stronger security into products during the development stage in order to mitigate the problem of botnets. The…
-
"To Pay Hackers’ Ransom Demands or to Invest in More Security?"NTT Security recently published its annual global Risk:Value Report to which 1,800 C-level executives and other decision makers from non-IT functions in different countries and industry sectors responded. According to the report, a third of global…
-
"Quantum Computers and the Unbreakable Lattice"Quantum computers are expected to render currently used encryption algorithms obsolete in the future. However, lattice cryptography has been proposed as an encryption method that can resist quantum computer attacks. This article continues to discuss…
-
"Face, Iris and Pulse Biometrics Close in on Fingerprint Tech"According to a market data report released by ABI Research called Biometric Technologies and Applications, biometric authentication systems based on face, iris, and pulse are expected to lower the market share of fingerprint technologies. Biometrics…
-
"AI Researchers Design 'Privacy Filter' for Your Photos"As the facial recognition technologies used by social networking platforms continue to evolve, concerns surrounding the personal privacy of users and security of data grow. AI researchers at the University of Toronto Engineering have developed an…
-
"Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System"65 security vulnerabilities have been found in the Defense Travel System (DTS). These vulnerabilities were discovered by white-hat hackers participating in the Pentagon's Hack the Defense Travel System program. This article continues to discuss…
-
"Monitoring 'Side Channels' to Detect Vehicle Hacks"A research company by the name of HRL Laboratories has a contract with the Department of Homeland Security (DHS) to develop a way in which intrusions into a smart vehicle’s controller area network (CAN) bus can be detected. In addition to examining the…
-
"The Problems With Hacking Back"The Active Cyber Defense Certainty (ACDC) Act was proposed to empower companies to adopt a more proactive approach to handling cybersecurity. The proactive approach would permit companies to hack back into other computer networks for the purpose of…
-
"Security Researchers Discover Multiple Epic Vulnerabilities in EOS Blockchain"The EOS blockchain platform has been discovered to contain multiple high-risk vulnerabilities. According to security researchers from a China-based cybersecurity firm by the name of Qihoo 360, the exploitation of these security vulnerabilities could…
-
"Internet of Things: When Objects Threaten National Security"IoT devices are becoming a greater threat to national security. The increasing development and use of IoT technologies provides more entry points for attackers into global information networks. This article continues to discuss the rise of IoT devices,…
-
"Attacking Hard Disk Drives Using Ultrasonic Sounds"New research reveals that hard disk drives (HDDs) are susceptible to interference from ultrasonic signals. According to researchers at the University of Michigan and Zhejiang University, ultrasonic attacks on HDDs can be launched using nearby sound…