News
  • "IoT Supply Chain Bug Hits Millions of Cameras"

    Security experts from Nozomi Networks have warned of a critical IoT supply chain vulnerability that may affect millions of connected cameras globally, allowing attackers to hijack video streams. Nozomi Networks revealed the flaw in a popular software…

  • "A Backdoor In Mobile Phone Encryption From the 90s Still Exists"

    Researchers from Ruhr-Universität Bochum (RUB), in collaboration with colleagues from France and Norway, analyzed the encryption algorithm GEA-1, which was implemented in mobile phones in the 1990s for data connection encryption. They found that the GEA-…

  • "Elekta Data Breach Leaks Patient Info at Oklahoma Cancer Center"

    The Cancer Centers of Southwest Oklahoma recently announced that it was involved in a data breach that may have leaked sensitive patient information. The data security incident occurred on April 28 through Elekta, a Swedish software company and business…

  • "Peloton Bike+ Bug Gives Hackers Complete Control"

    Researchers from McAfee's Advanced Threat Research (ATR) team discovered that the popular Peloton Bike+ and Peloton Tread exercise equipment contain a security vulnerability that could expose gym users to a wide variety of cyberattacks. According to the…

  • "A Big Step Towards Cybersecurity's Holy Grail"

    A significant advancement towards a user-friendly computing environment, in which the guarantee of security is as strong as a mathematical proof, has been made by a team of researchers at Carnegie Mellon University's CyLab. They revealed a new provably…

  • "Researchers Explore Continuous Liveness Detection for Voice Biometrics"

    A new study by scientists from Florida State University and Rutgers University delved into the possibility of continuous liveness detection for voice biometrics implemented on smart devices. They released a paper with the goal of strengthening security…

  • "NATO Warns it Will Consider a Military Response to Cyber-Attacks"

    NATO has warned it is prepared to treat cyberattacks in the same way as an armed attack against any of its allies and issue a military response against the perpetrators. In a communique issued by governments attending the meeting of the North Atlantic…

  • "Defending Against Smudge Attacks"

    Many people use a Personal Identification Number (PIN) to lock their smartphone in order to prevent a third party from accessing their contacts, messages, and other stored information in the event that the device gets lost or stolen. However, a malicious…

  • "Utilities ‘Concerningly’ at Risk from Active Exploits"

    Utilities’ vulnerability to application exploits goes from bad to worse in just weeks. The amount of time that utility networks spend exposed to a known application exploit has spiked over the past two months. A new report from WhiteHat Security measured…

  • "Attackers Target Volkswagen Vendor; 3.3 Million Audi Customers Impacted"

    Volkswagen revealed that its third-party vendor faced a data breach that impacted over 3.3 million current customers and prospective buyers of Audi vehicles in the U.S. and Canada. According to a statement released by the German car manufacturer, the…

  • Taking a look behind the Science of Security

    Taking a look behind the Science of Security (Podcast) Our very own Adam Tagert recently featured as a guest on the Cyberwire podcast's Research Saturday show where he discussed the Science of Security. Read more below and check out the podcast (linked…

  • "This Data and Password-Stealing Malware Is Spreading in an Unusual Way"

    The operators of SolarMarker malware are using PDF documents consisting of many Search Engine Optimization (SEO) keywords to increase visibility on search engines and lead potential victims to the malware on a malicious site posing as Google Drive.…