News
-
"Cyber experts believe more behind Petya attack than just ransomware"Cybersecurity researchers believe the recent global outbreak of Petya indicates open cyber warfare. Recent discoveries made by security experts show that the intentions behind the Petya attack are more far-ranging than expected. Security experts and…
-
"Satellite phone communications can be decrypted in near real-time"Two researchers from China have discovered the possibility of decrypting satellite phone communications that use GMR-2 cipher for encryption. The GMR-2 is a stream cipher that consists of a process in which keystreams are generated and ciphertexts are…
-
"Researchers Build Firewall to Deflect SS7 Attacks"Researchers from P1 Security have developed a firewall to combat attacks launched by the exploitation of Signaling System 7 (SS7) vulnerabilities within the mobile operators’ core networks, which will be presented at Black Hat USA. If exploited, SS7…
-
"Collaboration is key to combating cyber crime"Interpol encourages the improvement of information-sharing between government, law enforcement, businesses, and cybersecurity companies as the expanding landscape of cybercrime calls on the collaboration of such entities and groups to combat cyber…
-
"CopyCat Malware Infects 14M Android Devices in Ad Fraud Attack"Check Point researchers have shared their discovery of a newly emerged attack targeting Android devices called “CopyCat”. According to researchers, this attack has already infected around 14 million Android devices. Revenue is generated for attackers…
-
"UN finds cybersecurity is a struggle worldwide"As indicated by the Global Cybersecurity Index (GCI), recently published by the International Telecommunication Union (ITU), there is much need for a global upgrade on cybersecurity. As revealed by the survey of 134 countries, Singapore was rated the “…
-
"Libgcrypt ‘Sliding Right’ Attack Allows Recovery of RSA-1024 Keys"In an academic paper titled, “Sliding right into disaster: Left-to-right sliding windows leak”, researchers have shared their discovery of how the cryptographic library, Libgcrypt, is susceptible to a local side-channel attack. It has been revealed that…
-
“Identity Theft, the Not So Hidden Scourge”According to a recent study conducted and released by Javelin Strategy & Research, a record high of 15.4 million U.S. victims were targets of identity fraud in 2016. However, these findings pertaining to incidents of identity fraud are not surprising…
-
"Importance of AI, data in law enforcement suggests growing tension with privacy"Data is being generated more than ever due to the significant growth of online connectivity, therefore technologies such as artificial intelligence (AI) and machine learning are becoming more important in assisting law enforcement in the…
-
"This Dark Web Site Creates Robocalls to Steal People’s Credit Card PINs"Security researchers have discovered a new service that is being offered in the dark web, which can be used by cybercriminals to deceive victims into revealing their credit card pins. Stolen credit card and debit card numbers are often exchanged within…
-
"Encryption system hides your travel data from Uber"With the creation of apps by Uber and its competitors for the support of peer-to-peer transportation, online platforms have been developed to collect users’ personal data. As the number of users on these platforms continue to grow, so does the…
-
"SQL injection vulnerability found in popular WordPpress plug in, again"Researchers at Sucuri have discovered a SQL injection vulnerability within the WordPress plugin, WordPress Statistics, whilst performing a security assessment on popular open source products. The vulnerability arises with the injection of WordPress…