-
SoS Musings #15 - Bolstering Resilience to Defeat Automated and Distributed Cyber ThreatsSoS Musings #15 Bolstering Resilience to Defeat Automated and Distributed Cyber Threats
-
"Google to Patch Home and Chromecast Bug That Leaked Your Location"According to researchers, a bug in Google Home Speakers and Chromecast could allow data to be extracted from these devices, which reveals the physical location of users. Google will be releasing a patch to fix the bug in July. This article continues…
-
"Millions of Streaming Devices Are Vulnerable to a Retro Web Attack"Millions of media streaming devices and smart speakers have been discovered to be vulnerable to DNS rebinding attacks. Gadgets such as Google Home, Chromecast, Sonos Wi-Fi speakers, and more, are vulnerable to such attacks. This article continues to…
-
"Quantum Step Forward in Protecting Communications from Hackers"A quantum-based method to securely transmit encrypted information along communication lines has been demonstrated by researchers at the University of York. The quantum-based technique could possibly be used to avoid the vulnerabilities of current…
-
"Chinese Cyber Espionage Group Thrip Targeting Satellite Communications, Telecoms and Defense Companies"According to security researchers at Symantec, a China-based cyber espionage group dubbed Thrip has been targeting satellite operators, telecommunications companies, and defense contractors in the US and Southeast Asia. The group has been utilizing…
-
"Mac OS Bug Reveals Encrypted File Info, Claim Researchers"The latest Mac OS has been discovered to contain a security flaw that could allow the contents of encrypted files to be exposed. The bug involves Apple's 'Quick Look' feature. This article continues to discuss the security flaw found in the latest…
-
"Small Businesses Vulnerable to Cyberattacks, Then Don't Act"A survey conducted by Hiscox insurance reveals that the majority of small businesses that faced cyberattacks in 2017 did not take action to improve upon their cybersecurity following the impact of such attacks. The types of cyberattacks experienced by…
-
"Delft Scientists Make First ‘on Demand’ Entanglement Link"Researchers at QuTech in Delft University of Technology have developed a method in which quantum entanglement between two quantum chips can be generated on demand. The advancement further opens up the possibility for the creation of a quantum internet…
-
"Military Colleges Aim to Develop Cyber Programs"Leading military colleges and universities, including The Citadel, the University of North Georgia, Norwich University, Texas A&M, Virginia Military Institute, and Virginia Tech, will be developing cyber programs. The aim of these cyber programs is…
-
"Meltdown-Like 'LazyFP' Vulnerability Impacts Intel CPUs"A new speculative execution side channel vulnerability called LazyFP has been discovered to affect most Intel Core processors. The flaw related to the floating point unit (FPU) could be exploited by attackers to gain unauthorized access to sensitive…
-
"Connected Cars Vulnerable to Cyberthreats"Researchers have further highlighted the vulnerability of connected cars to cyberattacks. The addition of new features and functions to a connected car creates digital security risks and vulnerabilities. This article continues to discuss the…
-
"MysteryBot Android Trojan Aims at Banking Apps"A new type of malware called MysteryBot has been discovered by security researchers at Threat Fabric to be targeting banking applications. According to researchers, MysteryBot launches a banking Trojan, key logger, and ransomware. MysteryBot also…
News