-
"Massive macOS Vulnerability Exposed by Google Security Researchers"Google's Project Zero researchers have discovered a significant vulnerability in the macOS kernel. Hackers can exploit this vulnerability to modify mounted disk images without users knowing. This article continues to discuss the severity of the macOS bug…
-
"Most Laptops Vulnerable to Attack via Peripheral Devices"Researchers from the University of Cambridge and Rice University have brought further attention to the vulnerability of laptops and desktop computers to being hacked via peripheral devices such as chargers, docking stations, and projectors. According to…
-
"Best Practices for Balancing BYOD with Mobile Security"Mobile fraud is becoming more prevalent, while awareness is not. That is why if a company has employees BYOD then it is important to have a policy in place that looks at security. This article discusses the best practices in…
-
"The Overlooked Security Threat of Sign-In Kiosks"Vulnerabilities have been discovered to be contained by five mainstream visitor management systems, which are loaded on sign-in kiosks often used at businesses and facilities. These vulnerabilities would allow for the extraction of sensitive information…
-
"Exposing Flaws in Metrics for User Login Systems"A Rutgers University-New Brunswick study highlights flaws in the metrics used to measure the performance of authentication systems and proposes a solution towards measuring the success of such systems. The proposed method can be used by researchers,…
-
"Dow Jones Data Exposed on Public Server"Dow Jones data was exposed on a public server. An "authorized third party" was blamed for not securely storing more than 2.4 million records of risky businesses and individuals on a public server without password protection. This is why…
-
"Hackers Can Spy on and Hijack Amazon Doorbell’s Video Feed"An investigation into the security of Amazon's Ring Doorbell revealed a vulnerability that could allow the video feed of the home security device to be hacked and spied on. A cybersecurity researcher at Dojo By BullGuard recently released details…
-
"'Thunderclap' security flaw in Thunderbolt spec could compromise USB-C and DisplayPort"The Thunderbolt connectivity specification has been found to contain a security flaw. According to a team of security researchers, the flaw called Thunderclap, could enable computers to be attacked through their USB-C or DisplayPort hardware. This…
-
"Exchanging Information Securely Using Quantum Communication in Future Fiber-Optic Networks"Quantum technology is expected to improve the security of communication channels. Researchers at the National Institute of Information and Communications Technology in Japan are conducting research in which they explore the possibility of performing…
-
"5 ways employees can weaken your cybersecurity defenses"Cyber security is becoming more important for businesses as more businesses become more dependent on using computers. It is critical to take cyber security seriously, and that has to begin with training staff on how to be careful of attacks. …
-
"Internet-Connected Mr. Coffee Machines Have Security Vulnerability, Mcafee Says"McAfee recently released information pertaining to the vulnerability of a connected coffee maker to being hacked. According to the security firm, the coffee maker produced by Mr. Coffee and Wemo contains a security vulnerability that could enable hackers…
-
"Researchers Break E-Signatures in 22 Common PDF Viewers"Researchers at Ruhr-University Bochum in Germany have revealed vulnerabilities in PDF document viewers that could allow attackers to alter documents without invalidating electronic signatures. Three different attacks that could be performed through the…
News