News
-
"IoT Botnet Infects 100,000 Routers to Send Hotmail, Outlook, and Yahoo Spam"A five-year-old vulnerability in software used by a significant number of router models from multiple vendors has been exploited by a new botnet, which is now composed of about 100,000 home routers. The latest IoT botnet, called BCMUPnP_Hunter, is…
-
"A DJI Bug Exposed Drone Photos and User Data"Check Point researchers discovered a security vulnerability in drone systems manufactured by DJI, which has now been patched. Hackers could have exploited this vulnerability to take control of users' accounts as well as gain access to private data such…
-
"Research from Tenable Shows Enterprises Are Overwhelmed by Security Vulnerabilities"A new report released by Tenable highlights how overwhelmed enterprises are in relation to dealing with security vulnerabilities. According to the report, enterprises detect over 100 critical vulnerabilities in their environments every day, most of which…
-
"30 Years Ago, the World’s First Cyberattack Set the Stage for Modern Cybersecurity Challenge"In 1988, Robert Tappan Morris inadvertently performed a type of cyberattack that is now known as a distributed denial of service (DDoS) attack. The historic program, called the Morris worm, was the first of its kind, which slowed down large parts of…
-
"NAU Electrical Engineers to Lead Development, Commercialization of Next-Gen Cybersecurity Solutions for Internet of Things"The National Science Foundation's Partnerships for Innovation Program has awarded a $750,000 grant to a team of electrical engineers at Northern Arizona University (NAU) in support of the team's efforts to improve the security of IoT devices against…
-
"USB Threat to Industrial Facilities Comes into Sharp Focus with New Honeywell Data"A new study emphasizes the dangers posed by USB drives to the security of industrial facilities. Honeywell International conducted an examination of USB usage at 50 industrial sites on four continents and found that advanced threats such as Stuxnet,…
-
"GPU Side Channel Attacks Can Enable Spying on Web Activity, Password Stealing"Computer scientists at the University of California, Riverside, have discovered the ease at which attackers can spy on web activity via the use of graphic processing units (GPUs). In addition to spying on web activity, GPU side-channel attacks can also…
-
"Researchers Expose 'Critical Vulnerabilities' in SSD Encryption"Research conducted by Radboud University in the Netherlands reveals critical vulnerabilities in the encryption of solid state drives (SSDs). The reverse engineering self-encrypting SSDs' firmware exposed the presence of critical security vulnerabilities…
-
"New Data Protection Act Calls for Jail Time, Fines"A new Consumer Data Protection Act has recently been proposed by Oregon Senator, Ron Wyden. The aim of the bill is to hold companies more accountable for bolstering their cybersecurity and data privacy through the implementation of strict penalties,…
-
"Intel CPUs Impacted by New PortSmash Side-Channel Vulnerability"A new side-channel attack, dubbed PortSmash, has been discovered by researchers. PortSmash has been said to impact all CPUs that have simultaneous multithreading (SMT) capabilities. Intel Skylake and Kaby Lake CPUs have been found to be vulnerable to…
-
"Unhackable Computer Relying on Firmware Security Rather Than Software Patches"A team of researchers received a $3.6 million grant from the Defense Advanced Research Projects Agency in support of a project, called MORPHEUS, which applies a significantly different approach to cybersecurity from what is used today. The approach aims…
-
"These New Techniques Expose Your Browsing History to Attackers"Four new ways in which hackers can find out which websites that users have visited were discovered by security researchers at UC San Diego and Stanford. The techniques demonstrated by researchers are categorized as history sniffing attacks, which can be…