News
-
"Developing a Secure, Un-Hackable Quantum Network"A team of scientists led by the University College London (UCL) has developed a new method in which communication can be performed securely between three or more quantum devices regardless of their manufacturers. This development demonstrates the…
-
"Pulses of Light to Encrypt Data and Protect Security of Cryptocurrencies"According to experts, the fiber optic cables in which data travels, are vulnerable to being intercepted. Researchers at the USC Viterbi School of Engineering have developed a new frequency comb that can create a multitude of lasers from a single laser as…
-
“Spectre Reversal: AMD Confirms Chips Have Flaws”Last Thursday, chip maker AMD reversed an earlier statement made regarding the vulnerability of their technology against Spectre, stating now that its chips are in fact susceptible to the attacks. AMD has also noted that the company is working closely…
-
"147 Security Vulnerabilities Reported in ICS Mobile Applications"Security firms IOactive and Embedi have released a new report, which reveals the inadequate security of mobile applications used in the monitoring of Industrial Control System (ICS) technology. 34 ICS mobile applications used in conjunction with…
-
"Banks Eye Blockchain, Concerned about Cybersecurity"Banks are considering using blockchain technology to improve upon cybersecurity. According to Jenny Menna, a U.S. Bank cybersecurity blockchain specialist, the banking industry is looking to blockchain technology to ensure secure communication,…
-
"Google Creates Software Protection Technique to Ward off Spectre Bug"Amid efforts by companies to fix the Meltdown and Spectre vulnerabilities through patches, Google has developed a new coding technique by the name of Retpoline to assist software developers in reducing risks posed by Spectre. Retpoline could be used by…
-
"UK Data Protection Bill Tweaked to Protect Security Researchers"The UK government has made changes to its Data Protection Bill in order to protect security researchers who work to determine whether anonymized data sets such as medical records and other personal data are adequately anonymous. The amendments are in…
-
"Wi-Fi Alliance Launches WPA2 Enhancements and Debuts WPA3"Security enhancements for security protocols WPA2 and the upcoming WPA3, have been announced by the Wi-Fi Alliance. According to the Wi-Fi Alliance, security enhancements made to the WPA2 protocol aims to improve upon security authentication, encryption…
-
“A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats”A draft report published by the US Departments of Commerce and Homeland Security was announced by the National Institute of Standards and Technology (NIST). This draft was developed in response to Executive Order 13800, Strengthening the Cybersecurity of…
-
"What Is LightsOut? New Adware Found Infesting 22 Flashlight Apps with over 1.5 Million Downloads"A new mobile adware program called LightsOut was discovered by Check Point researchers to be hidden in 22 fraudulent flashlight and utility applications that were available for download in the Google Play Store. LightsOut unleashed a barrage of pop-up…
-
"Stealthy Crypto-Miners Are Slipping Into Web Ads"Through the use of an artificial intelligence system called Sarah, Spotad was able to discover the use of legitimate-looking online advertisements by cybercriminals to mine for Monero cryptocurrency. The process of mining would be activated upon clicking…