News
-
"Hospital Viruses: Fake Cancerous Nodes in CT Scans, Created by Malware, Trick Radiologists"Security researchers at the Ben Gurion University Cyber Security Research Center in Israel have created malware that would enable attackers to alter CT or MRI scans, bringing further attention to the security vulnerabilities present in medical imaging…
-
"Computer Program Developed to Find 'Leakage' in Quantum Computers"Researchers from the University of Warwick's Department of Physics have developed a quantum computer program to identify if information processed by a quantum computer is being leaked from the states, 0 and 1. The information gathered by this…
-
"Spear-phishing Is The Next Threat After A Data Breach"Data breaches are becoming more and more frequent. After a data breach, an immense quantity of data is leaked and exposed online. Usually this data includes personal and professional information. After a data breach, attackers will use a…
-
"Secure ‘Internet-of-Body’ Could Protect Medical Devices from DHS-Warned Cyberattacks"The U.S. Department of Homeland Security (DHS) recently issued warnings pertaining to the vulnerability of implantable defibrillators, made by Medtronic PLC, to being hacked. Medtronic devices are vulnerable to cyberattacks because of the poor encryption…
-
"Researchers Trick Tesla Autopilot into Steering into Oncoming Traffic"Researchers from Tecent's Keen Security Lab were able to deceive the Enhanced Autopilot feature of a Tesla Model S 75 into steering towards oncoming traffic by placing small stickers on the ground. Tesla's Enhanced Autopilot gathers information…
-
"How the EverCrypt Library Creates Hacker-Proof Cryptography"A set of digital cryptography tools, called EverCrypt, has been released by a group of computer scientists with the goal of eliminating coding bugs that could be exploited by hackers to launch damaging hacking attacks. The cryptographic library,…
-
"Analysis: Dark Web Arrests Also Led to Ransomware Disruption"Last week, Europol, the FBI and other law enforcement agencies made 61 arrests of individuals that were suspected of selling illegal goods on the dark web. The "Dream Market" dark web site was closed, and was considered a successor to the…
-
"A Guide to LockerGoga, the Ransomware Crippling Industrial Firms"LockerGoga is a devastating ransomware attack that is affecting industrial businesses. This malware is particularly disruptive, shutting down computers entirely, locking out their users, and rendering it difficult for victims to even pay the…
-
"KAIST Team Used Fuzzing to Spot Newer LTE Protocol Vulnerabilities"36 vulnerabilities were found in 4G LTE wireless networks by researchers at the Korea Advanced Institute of Science and Technology (KAIST) through the use of a semi-automated fuzzing tool. The exploitation of these vulnerabilities could allow attackers…
-
"Critical Magento SQL Injection Flaw Could Be Targeted by Hackers Soon"Security patches have been released by Magento to fix vulnerabilities in its content management system, which is widely-used by online shops. These security patches address 37 issues associated with the commercial and open-source versions of the Magento…
-
"Personal Health Details of More Than 350,000 Oregonians Potentially Exposed in HIPAA Breach"The Oregon Department of Human Services (DHS) recently faced a phishing attack that resulted in the exposure of protected health information (PHI) belonging to more than 350,000 Oregonians. The information exposed in this attack include names, addresses…
-
"Russia Regularly Spoofs Regional GPS"A report published by the Center for Advanced Defense (C4ADS) highlights findings of an analysis of global positioning data. A key finding is the spoofing and blocking of satellite navigation signals by Russia. According to the report, at least 9,…