News
  • "Hackers Can Use Sound Waves To Crack Your Smartphones, Scientists Suggest"
    Security researchers at University of South Carolina and University of Michigan have discovered a small security loophole in smartphones that could cause major problems. This loophole would enable a hacker to infiltrate and manipulate a device using…
  • "Ben-Gurion University researcher identifies solution to protect online videos and images from cyberattacks"
    There has been a noticeable increase in the use of online videos and images to launch cyberattacks. A researcher at Ben-Gurion University has discovered a way to protect online videos and images from being infiltrated by hackers through a set a of…
  • "PetrWrap, the 'Almost Flawless' Ransomware"
    PetrWrap is the latest ransomware that builds upon a malicious cryptographic algorithm of another ransomware called Petya. Petya was discovered in 2016 by Kaspersky Lab and revealed to encrypt stored data and overwrite the MBR of the targeted …
  • "Malicious uploads allowed hijacking of WhatsApp and Telegram accounts"
    The developers of popular communication service apps, WhatsApp and Telegram, have recently patched their application code after being notified by security researchers of vulnerabilities that would allow attackers to infiltrate user accounts through the…
  • "Rapid7 discloses multiple vulnerabilities in telepresence robot"
    Rapid7 has discovered three security vulnerabilities in the telepresence robot, which is a device that combines a camera, microphone, and iPad to allow users to remotely participate in face-to-face meetings. Three of the vulnerabilities discovered…
  • "White House Report Finds Cybersecurity Gaps at Federal Agencies"
    According to a White House report, there have been 30,899 hacking incidents that have targeted federal government agencies in 2016. While there has been an increased effort to develop stronger cyber defense, major advancements still need to be made in…
  • "Apache Struts 2 – Under Attack Now"
    Apache Struts 2 has been discovered to have a vulnerability within its open source code. Cyberattacks are currently exploiting this vulnerability as Apache Struts 2 is widely utilized to develop Java web applications in the financial services…
  • "SGX Malware Extracts RSA Key in Five Minutes"
    Software Guard Extensions use isolation methods to safeguard code and data from content modification and exposure. Intel is now utilizing this method for Skylake models in order to further protect data in the cloud. However, researchers at Graz…
  • "WikiLeaks Dumps CIA Hacking Docs Online"
    WikiLeaks strikes again as it exposes classified documents of the U.S. Central Intelligence Agency. Leaked documents reveal confidential information pertaining to hacking programs and weaponized malware such as trojans and viruses. This article discusses…
  • "The Darknet protects itself by being more robust against attacks"
    Researchers at URV reveal why it’s so difficult for cyberattacks to penetrate the Darknet. The Darknet is the hidden part of the internet that allows users to anonymously exchange sensitive information and perform illicit activities. Researchers reveal…
  • "Honeypot catches social engineering scams on social media"
    Research company, ZeroFOX, performed an investigation on impersonators on social media by creating honeypot accounts within a sandboxed environment and observing the different social engineering tactics performed. This article discusses the motives…
  • “Why Printers Still Pose a Security Threat”
    Researchers at University Alliance Ruhr have performed further investigations on printer security and have announced that printers within a network are still prone to several different types of attacks. Laser printers have been identified as the most…