News
-
"Majority of Health Apps Plagued with Security Risks, Say Researchers"A study conducted by researchers at the University of Pireus in Greece and Rovia I Virgili University in Spain, indicates that the majority of health apps contain security flaws. The inadequate security of such apps pose a threat to the privacy of users…
-
"6 Use Cases for Blockchain in Security"Blockchain technology has attracted much attention from leaders across different industries as the technology has the potential to improve upon cybersecurity in many ways. The methods of blockchain technology could be applied to improve authentication…
-
"In Just 24 Hours, 5,000 Android Devices Are Conscripted into Mining Botnet"A new botnet has been recently discovered by security researchers at Netlab to have already infected more than 5,000 Android devices with worm-like malware. The malware behind the botnet causes the infected devices to mine Monero cryptocurrency.…
-
"New Cybersecurity Course Teaches Teens the ABCs of (Ethical) Hacking"A new cybersecurity course will be offered to high school students by CodeHS, which is a teaching platform for coding courses. The course will be geared towards offering students hands-on learning of aspects within cybersecurity such as vulnerabilities,…
-
"Government Backs National Cyber Policy and Strategy Competition"The Atlantic Council has announced that the UK will be hosting the Cyber 9/12 Student Challenge in February 2018. This challenge is a cyber policy and strategy competition in which university students from all academic disciplines are given the…
-
"Just 20% of Orgs Have Breach Notification Plans"Tripwire conducted a survey to which 406 cybersecurity professionals responded. According to the results of the survey, an overwhelming majority of organizations that will be affected by the European Union’s General Data Protection Regulation (GDPR) have…
-
"Georgia Bill Poses Potential Threat to Cybersecurity Researchers"The Senate Bill 315 introduced to the Georgia General Assembly by State Sen. Bruce Thompson is raising major concerns among cybersecurity researchers due to its unclear language. The aim of the bill is to criminalize unauthorized computer access in the…
-
"Easy Decryption Shows That Chat-App Designers Should Improve the Ways They Protect Users' Personal Data"A*STAR researchers were able to recover decryption keys for popular instant-messaging applications WeChat and WhatsAPP, which could allow users' personal data and information to be collected. A mobile forensics method called information flow analysis was…
-
"'Jackpotting' ATM Hack Comes to the United States"Jackpotting attacks are now being launched within the United States to pilfer money from ATMs. Jackpotting is a hacking scheme in which cybercriminals manipulate ATM machines into rapidly disbursing cash through the deployment of malware. This…
-
"Widespread API Use Heightens Cybersecurity Risks"According to a new survey conducted by Imperva, cybersecurity concerns surrounding the use of application programming interfaces (APIs) have significantly increased. Public-facing APIs raise security concerns as they provide a way in which hackers could…
-
"Microsoft Disables Spectre Mitigations Due to Instability"Microsoft released an update (KB4078130) over the weekend, designed to disable the mitigation sent out by Intel for the flaw causing Spectre Variant 2 (CVE-2017-5715). The update was sent out in response to Intel's announcement that the patches sent out…
-
"CT, MRI Machines Face the Greatest Risk of Cyberattack, Researchers Warn"A new report released by researchers from Ben-Gurion University highlights the increasing vulnerability of medical equipment to being targeted by cyberattackers. Researchers emphasize the importance of strengthening the security of Medical Imaging…