News
-
"LTE Flaws Let Hackers ‘Easily’ Spoof Presidential Alerts"Hackers can use off-the-shelf equipment and open source software to exploit security vulnerabilities in LTE that could allow them to spoof presidential alerts disseminated to mobile devices, which could lead to panic and chaos. The attack designed by…
-
"New Research Reveals a Surprising World of IoT"A study has been done by researchers from Stanford University in which they examined user-initiated scans of 16 million homes and 83 million devices to further explore the use of Internet of Things (IoT) devices. From the analysis of scans and devices,…
-
"Healthcare Overconfident in Privacy Maturity, As Breach Rate Rises"Integris researchers conducted a survey to which 258 top business executives and IT decision makers who work in medium-sized to large-sized healthcare organizations responded. Results of the survey reveal that most healthcare organizations are overly…
-
"Three Quarters of Mobile Apps Have This Security Vulnerability Which Could Put Your Personal Data at Risk"According to Positive Technologies' Vulnerabilities and Threats in Mobile Applications 2019 report, most iOS and Android applications contain vulnerabilities that could allow hackers to steal sensitive data. These vulnerabilities derive from insecure…
-
"Google Turns to Retro Cryptography to Keep Data Sets Private"An open source cryptographic tool, called Private Join and Compute, has been released by Google to bolster the privacy of confidential data sets. The multi-party computation (MPC) tool was designed to help organizations with confidential data sets…
-
"Report on Cognitive Security Market, Trend, Segmentation and Forecast 2026"The growing frequency of cyberattacks has resulted in more interest in cognitive security. Cognitive security solutions are expected to help increase the speed at which risk patterns in internal and external sources are analyzed. The implementation of…
-
"Facebook’s Libra: Cryptocurrencies in the Mainstream or a Hacker’s Paradise?"As Facebook's plans to introduce Libra, there are a few main questions. Does the introduction of cryptocurrency on Facebook signal cryptocurrencies entering the mainstream or will it be a hacker's paradise? Libra will allow…
-
"These Wi-Fi Extenders Had Vulnerabilities That Gave Hackers Complete Control"According to security researchers from IBM, Wi-Fi extenders from the router company, TP-Link, contain a critical vulnerability that could allow attackers to take over them. Through the exploitation of this vulnerability, attackers could perform malicious…
-
"SUTD Researchers Enhance Security In Proof Of Stake Blockchain Protocols"Blockchain technology has attracted much attention from banks, governments, and techno-corporations as the technology has the potential to improve upon security and privacy. Proof of Stake (PoS) is a consensus algorithm used in Blockchain technology to…
-
"Research Shows Tesla Model 3 and Model S are Vulnerable to GPS Spoofing Attacks"During a study, researchers were able to remotely affect various aspects of the driving experience of the Tesla Model 3, including navigation, mapping, power calculations, and the suspension system, through GPS spoofing. During a test drive using Tesla’s…
-
"Hack Your State Department Act Introduced in Senate"Senators, Cory Gardner (R-CO) and Ed Markey (D-MA), recently introduced the Hack Your State Department Act. The legislation would establish a process for the general public to properly disclose vulnerabilities that they find in the Department of State's…