News
-
“New Nanoscale Security Method May Be The Best Hacking Prevention”Researchers at the New York University Tandon School of Engineering have introduced a new method that could be used to inexpensively provide maximum security against hacking. This method uses a new class of Cryptographic primitives made of…
-
"Uber Admits It Hid Massive Data Breach of 57M Users and Drivers"Uber has recently admitted that it faced a massive data breach in late 2016, which exposed personally identifiable information belonging to 56 million users and 600,000 drivers. Information exposed by this breach includes names, email addresses, phone…
-
"'Hundreds' Of Websites Track User Keystrokes"A study conducted by Princeton University alleges the use of session replay scripts by more than 480 websites to record each visitor’s keystrokes, which would then be sent to third-party servers. In addition to keystrokes, these session replay scripts…
-
"How Quantum Computing Could Create Unbreakable Encryption and Save the Future of Cybersecurity"In the latest issue of Science Advances, researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory, have announced a new breakthrough in quantum computing in which they have significantly increased the speed of quantum…
-
"Mobile Malware a Universal Threat Around the Globe: Check Point"Findings shared within the recent Check Point Mobile Threat Research Report reveals that no company is completely safe from mobile malware as an overwhelming majority of the 850 organizations worldwide have faced at least one mobile attack in the last…
-
"Creating ATM Botnets Not Difficult, Researchers Say"According to Kaspersky Lab researchers, Olga Kochetova and Alexey Osipov, automated teller machines (ATMs) often run outdated and flawed software, which significantly increases their vulnerability to cyber and physical attacks. The vulnerability of these…
-
“Windows 10 Security Feature Broken, CERT/CC Warns”CERT/CC has recently revealed a flaw in the Windows operating system, affecting users of Windows 8, 8.1, and 10. The flaw is based in a feature known as ASLR (address space layout randomization), which helps prevent attacks such as code-reuse and return-…
-
"Worried About Hackers, States Turn to Cyber Insurance"As the severity of cyberattacks continues to grow, states are increasingly making use of cyber insurance for protection. Cyber insurance policies are meant to cover the massive losses and expenses faced by states in the event that their computer networks…
-
"Intel Chip Flaws Leave Millions of Devices Exposed"Critical flaws have been discovered within the Intel Management Engine (ME), Intel Trusted Execution Engine (TXE), and Server Platform Services (SPS). The ME is a subsystem that runs independently within the Intel chipset, which enables management…
-
"NHS Needs to Develop Cyber-Sec Culture to Reap Benefits of Digitisation"The results of a survey conducted by Palo Alto in collaboration with Vanson Bourne, have revealed the beliefs of National Health Service (NHS) IT managers in regards to cybersecurity in the NHS. The survey touched upon subjects of data security,…
-
“Four Methods Hackers Use to Steal Data from Air-Gapped Computers”Security researchers have demonstrated ways in which data could be extracted from air-gapped computer systems through the development of covert channels. These channels are characterized into 4 different types, which include electromagnetic, acoustic,…