News
-
"Toshiba Has a Plan to Extend Quantum Security to Record-Breaking Distances"Toshiba has devised a new method in which secure encrypted messages are transmitted through the use of quantum mechanics. The method is expected to use fiber optic cables to send quantum keys between the sender and recipient up to 550 kilometers apart.…
-
"Tech Giants Urge Governor to Veto Georgia Cybercrime Bill"Google and Microsoft have joined cybersecurity experts in the push against Georgia Senate Bill 315. The cybercrime bill aims to criminalize unauthorized access to a computer or computer network, which would significantly impede upon actual efforts to…
-
"Intel Facing New Spectre-Like Security Flaws"A German computing magazine by the name of c’t, alleges that there may be eight new Spectre-level vulnerabilities contained by Intel processors. Four of these vulnerabilities are considered to be high-risk, while the other four are classified as medium-…
-
"How to Prevent SQL Injection Attacks"SQL injection remains a highly effective hacking technique today. Hackers apply this technique on databases used on the backend of websites or web applications to perform malicious activities such as modify content, capture sensitive information, and…
-
"Medical Devices Vulnerable To KRACK Wi-Fi Attacks"Medical devices manufactured by Becton, Dickinson and Company have been found to contain a set of Wi-Fi security bugs called KRACK attacks. The exploitation of these flaws could allow hackers to eavesdrop on hospital wireless networks and gain control…
-
"Attack-Simulation Tool Protects Financial Services"The financial services industry continues to be one of the most targeted sectors by cyberattacks as cybercriminals are often seeking financial gain. The European Central Bank (ECB) has designed a new cyberattack simulation tool that will be used by…
-
"Most Top Travel Websites Fail to Protect User Security"A study conducted by Dashlane reveals that the majority of top travel sites fail to apply adequate security practices to protect user accounts from hackers. According to the findings of the study, most of the travel-related sites examined do not provide…
-
"Why Fileless Malware Will Continue Its Rapid Expansion"The prevalence and evolution of fileless malware continues to grow. Since fileless malware attacks do not require the downloading of executable files to infiltrate systems, they are difficult to detect and analyze. This article continues to discuss the…
-
“A Remote Hack Hijacks Android Phones Via Electric Leaks in Their Memory”A new form of the Rowhammer attack has been detailed by researchers in the VUSec research group at Vrije Universiteit in Amsterdam. In addition to causing an electromagnetic leakage in memory and triggering bit flips, the attack called GLitch also…
-
Adam's RSA Trip ReportThis year, I had a great opportunity. I got to travel to the RSA Conference and be both an attendee and also help represent Science of Security and Privacy at the agency’s booth. I tried to update the VO each day of the conference, but I found I didn’t…
-
"Millions of Fibre Broadband Routers Open to Remote Control by Hackers"Security researchers at VPN Mentor have discovered critical flaws contained by fiber-optic routers. The vulnerabilities could allow hackers to evade authentication and take control over the devices. This article continues to discuss the vulnerabilities…