News
-
"LTE Security Flaws Could Be Used for Spying, Spreading Chaos"Researchers at Purdue University and the University of Iowa discovered 10 new types of attacks upon assessment of their proof-of-concept penetration testing toolset by the name of LTEInspector on 4G LTE networks. The security flaws discovered to be…
-
"Cyber Espionage Campaign ‘Slingshot’ Targets Victims Via Routers"Security researchers have discovered a new cyber-espionage threat called Slingshot in which MikroTik routers were used to infect the computers of around 100 victims in the Middle East and Africa. The routers targeted by the Slingshot APT were used to…
-
"How Creative DDOS Attacks Still Slip Past Defenses"DDoS attacks in which a targeted system is flooded with traffic in order to disrupt operations and availability of services, continues to grow in volume and creativity. The many different variations and elements of DDoS attacks pose a significant…
-
"These Popular Robots Are Defenseless Against Cyberattacks"Security researchers at IOActive have demonstrated that it is possible to infect robots with ransomware. Two robots developed by SoftBank named Pepper and Nao can be hacked through the exploitation of unprotected modules within their functions. This…
-
“Mac Malware More Than Doubled in 2017”Security firm, Malwarebytes, warns of the rise of malware targeting Apple Mac computers. The detection of such malware has increased significantly from 2016 to 2017, with new Mac threats emerging in 2018. This article continues to discuss the increased…
-
“Combining Old and New to Create a Novel Power Grid Cybersecurity Tool”A R&D project led by Berkeley Lab researchers aims to improve upon the protection of the electric power grid in the event of a cyberattack. The project incorporates cybersecurity, machine learning algorithms, and power system sensor devices to…
-
"Two-Factor Authentication Gets Simplified with a New Sonic Vibration Token"Security researchers at Ben-Gurion University of the Negev have developed a new form of two-factor authentication based on a new attack, which uses ultrasonic vibrations. This new method of two-factor authentication improves upon the accessibility of the…
-
"What Is Triada? Data-Stealing Malware Infects over 40 Android Models' Firmware While Manufacturing"Triada is a highly-stealth and complex malware designed to infiltrate the firmware of Android devices during manufacturing. The pre-installed malware allows hackers to perform malicious activities such as stealing data and more. This article continues to…
-
"UK Government Sets Cyber Security Guidelines for Millions of IoT devices”New guidelines have been set by the UK government to improve upon the security of IoT devices. Manufacturers of IoT devices will be expected to ensure that passwords are highly unique and unable to be reset to factory default passwords. In addition,…
-
"Hackers Using Blockchain to Keep Authorities at Bay & to Sustain Operations"Cybercriminals are taking advantage of the security offered by blockchain technologies to protect their malicious operations from being taken down by law enforcement authorities. According to a report released by security firm, RSA, cybercriminals are…
-
"Insider Threat Seriously Undermining Healthcare Cybersecurity"Reports released by Verizon and Accenture indicate that the healthcare sector experiences more security incidents involving insiders than any other sector. Financial gain was found to be the main motivation behind security incidents involving insiders.…