-
"Google Play Malware Used Phones’ Motion Sensors to Conceal Itself"Trend Micro researchers have discovered the use of motion sensors by malicious Google Play apps, BatterySaverMobi and Currency Converter, to evade detection. The motion-sensor input of infected devices is monitored by the malicious apps prior to…
-
"International Award-Winning Technology Protects the Power Grid by Hacking Would-Be Hackers"A system aimed at improving the security of the power grid against hackers has been developed by Milos Manic, professor of computer science and director of VCU’s Cybersecurity Center, in collaboration with the Idaho National Laboratory (INL). The…
-
"Cyberattacks Now Cost Businesses an Average of $1.1M"A new report by Radware highlights the rising average cost of a cyberattack faced by a business. According to the report, the average estimated cost of a cyberattack on a company has risen to $1.1 million. The report also brings further attention to the…
-
"Decrypted Telegram Bot Chatter Revealed as New Windows Malware"Following the discovery of a vulnerability in Telegram's encryption, researchers at Forcepoint Labs found that a hacker has been using a Telegram bot to communicate with new malware, called GoodSender. The commands sent via the Telegram bot to the…
-
"Cryptomining Malware Uninstalls Cloud Security Products"New cryptocurrency mining malware has been identified by researchers from Palo Alto Networks' Unit 42. The new malware is unique in that it is capable of uninstalling cloud security products such as those that are developed by Tencent Cloud and…
-
"Fortnite Had a Security Vulnerability That Let Hackers Take over Accounts"Security researchers at Check Point discovered vulnerabilities contained by the Epic Games' website that could have allowed hackers to hijack the accounts of Fortnite gamers. The unauthorized access of Fortnite accounts would have enabled the…
-
"As the Government Shutdown Drags on, Security Risks Intensify"Federal departments and agencies, including the Department of Homeland Security, Environmental Protection Agency, and more, may be at an increased risk of experiencing cybersecurity breaches due to the current partial government shutdown. Cybersecurity…
-
"New Side-Channel Attack Steals Data from Windows, Linux Page Cache"Researchers have published a paper, titled "Page Cache Attacks", in which a new software side-channel attack is detailed. The new attack can be launched against Windows and Linux, targeting the page cache of these operating systems to steal…
-
"Tesla’s Model 3 Will Be the Prime Target at Upcoming Hacker Contest"Pwn2Own is a hacking contest in which ethical hackers are encouraged to find vulnerabilities in programs. An upcoming Pwn2Own contest in Vancouver will focus on the Tesla Model 3. Tesla welcomes security researchers to probe its …
-
"The Quiet Threat Inside ‘Internet of Things’ Devices"The number and utilization of Internet of Things (IoT) devices continues to increase at a rapid rate. However, the security of IoT devices remains insufficient, leaving such devices vulnerable to being taken over by hackers. This article continues…
-
"Phishing Attacks Bypass Two-Factor Authentication"Security researcher, Piotr Duszynski, has released a tool, called Modishka. Modishka is a penetration testing tool that can be used to simplify the execution of phishing campaigns. The tool can also be used by hackers to circumvent two-factor…
-
"Arm Yourselves for Healthcare’s Cybersecurity War"The U.S. healthcare industry continues to be one of the industries most targeted by hackers due to the large amount of sensitive data stored and exchanged by systems used within this industry. As a result, the U.S. Department of Health and Human Services…
News