News
-
"One Million Devices Open to Wormable Microsoft BlueKeep Flaw"Security researchers discovered a critical remote code-execution Microsoft flaw, called BlueKeep, that could be as impactful as WannaCry and NotPetya. Although the flaw has been fixed, researchers have warned that one million public internet-connected…
-
"The Pentagon is Trying to Secure Its Networks Against Quantum Codebreakers"Quantum computers are expected to be capable of breaking current encryption systems, including those used by the government. Therefore, it is essential that new encryption techniques are further explored and developed. The Defense Information Systems…
-
"Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research"According to researchers at Cambridge University, unique device fingerprints could be generated by attackers through the use of motion sensors built into mobile devices, allowing users to be tracked across the internet via their iOS and Android devices.…
-
"Solving the network visibility problem with NaaS"Network visibility is important to an organization. In order to achieve network visibility one should do the following things. First, one should clearly map out their network and network endpoints. Secondly, one should conduct a survey of…
-
"As Bitcoin Surges, Hackers Rush to Spread Cryptocurrency Malware on Google Play"There has been a revival in cryptocurrency malware in response the increased price of Bitcoin. ESET security researchers found two fake cryptocurrency apps on Google Play, called Trezor Mobile Wallet and Coin Wallet. According to researchers, these apps…
-
"If you haven’t yet patched the BlueKeep RDP vulnerability, do so now"There is still no public, working exploit code for CVE-2019-0708. The BlueKeep RDP vulnerability is a flaw that could allow an unauthenticated remote attacker to execute remote code on a vulnerable target running Remote Desktop…
-
"Crowdsourced Security Gaining Ground for IoT and Enterprise"Crowdsourced security testing platforms (CSTP) are becoming more popular among enterprises to identify vulnerabilities in IoT products before they are exploited by cybercriminals. The approach of crowdsourced security involves the use of white-hat…
-
"New All-Fiber Device Simplifies Free-Space Based Quantum Key Distribution"As the era of fully developed quantum computers approaches, post-quantum cryptographic methods must continue to be explored as this advanced technology is expected to render current encryption algorithms obsolete. The secure communication method, quantum…
-
"Consumer IoT Devices Are Compromising Enterprise Networks"The number of consumer Internet of Things (IoT) devices connected to enterprise networks has increased significantly. According to the 2019 IoT Threats Report, which highlights findings of a study conducted by researchers at Zscaler ThreatLabZ, many IoT…