News
-
"Pegasus Spyware Used Against Thailand’s Pro-Democracy Movement"The Citizen Lab is an interdisciplinary research initiative focusing on information and communication technologies and human rights at the University of Toronto. Citizen Lab has claimed that Pegasus spyware is being used against Thailand's pro-…
-
"Bogus Cryptocurrency Apps Swindle Users Out of Millions, FBI Warns"FBI recently stated in an alert that fraudulent cryptocurrency investment apps bilked at least 244 victims out of nearly $43 million. The fraudulent apps identified in the alert posed as legitimate banking institutions, inviting investors to…
-
"Tor Browser Adds Automatic Censorship Circumvention"The Tor Project recently updated its flagship anonymizing browser to make it easier for users to evade government attempts to block its use in various regions. According to the US-based non-profit that manages the open source software, Tor Browser…
-
"The First Formal Verification of a Prototype of Arm CCA Firmware"Researchers at Columbia Engineering, working with Arm, a semiconductor IP and software design company, has revealed key verification technologies for the Arm Confidential Compute Architecture (Arm CCA), a new feature of the Armv9-A architecture. Their…
-
"Average American Accesses Suspicious Sites 6.5 Times a Day"Security researchers at AT&T discovered that the average person happens upon a suspicious online site or social media account 6.5 times a day. The researchers surveyed 2000 general population Americans. The researchers found that 54% of…
-
"How Attackers Could Dupe Developers into Downloading Malicious Code From GitHub"It is simple to counterfeit the metadata that developers look at when determining whether to use an open-source project on GitHub, giving attackers a chance to deceive users into downloading malicious code. The researchers at Checkmarx caution in a new…
-
"Google Boots Multiple Malware-laced Android Apps from Marketplace"Google has removed eight apps from its Google Play store that were spreading a new variant of the Joker spyware. However, the malicious apps had already been downloaded over 3 million downloads. Maxime Ingrao of the cybersecurity firm Evina discovered…
-
"VoIP Servers Being Targeted by Hackers Using Digium Phone Software"As part of an attack intended to exfiltrate data by downloading and running additional payloads, a web shell was dropped on the servers of VoIP phones running Digium's software. According to a report released by Palo Alto Networks Unit 42, the malware…
-
"Researchers To Enhance Security Of Next-Generation Wireless Systems"Guofei Gu, a professor in Texas A&M University's Department of Computer Science and Engineering, is the principal investigator of a research team that has received a $1 million grant from the National Science Foundation's (NSF) Resilient and…
-
"Security Awareness and Training Crucial to Preventing Healthcare Phishing Attacks"Healthcare phishing attacks remain a top cyberattack vector, but new research shows that consistent security awareness training can significantly reduce the likelihood of a successful attack. KnowBe4 examined a dataset of over 9.5 million users in 19…
-
"Outsourcing Security is The Only Solution For Many Smaller Teams"According to new research by Cynet, companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises. The researchers stated that these enhanced risks are…