-
"Bill Advances to Create Vulnerability Disclosure for Federal Internet of Things"Under the Internet of Things Cybersecurity Improvement Act, a vulnerability disclosure process would be established for agencies that discover vulnerabilities in Internet of Things (IoT) devices. The bipartisan bill would also prohibit U.S. government…
-
"Top Roadblocks to Securing Web Applications"Data breaches have become a common occurrence. In Australia, the Australian Information Commissioner (OAIC) found that a data breach affected more than 10 million Australians. This data breach is just one of many that have recently been experienced by…
-
"Report: Security of iOS and Android Mobile Apps 'Roughly Equivalent'"It is widely believed that iOS mobile apps are a lot safer than Android mobile apps. However, in a new study, it was discovered that actually the security of iOS and Android mobile apps are about the same, and that no company has more secure…
-
"Hackers Hit over a Dozen Mobile Carriers and Could Shut down Networks, Researchers Find"Security researchers with Cybereason have identified an advanced, persistent attack, which they have dubbed Operation Soft Cell. The attack is aimed at stealing sensitive data from telecommunications providers located in Europe, Asia, Africa, and the…
-
-
"You’d Better Change Your Birthday – Hackers may Know Your PIN"In a study it was discovered that 26 percent of individuals use the top 20 most used PIN numbers, which makes guessing of PIN numbers quite easy. Most individuals also use important dates when it comes to creating PIN numbers. It is…
-
"Researchers Develop 'Vaccine' Against Attacks on Machine Learning"A significant breakthrough in machine learning (ML) research has been made by researchers from the Commonwealth Scientific and Industrial Research Organization's (CSIRO) Data61, an arm of Australia's national science agency specializing in data and…
-
"A Malware Can Bypass ‘2FA’ In ‘Android’ Phones, Researchers Found"Researchers have discovered the distribution of malware via the Google Play Store that can evade security firewalls. This discovery follows Google's confirmation that some low-end Android devices contain pre-installed malware. According to cybersecurity…
-
-
-
"LTE Flaws Let Hackers ‘Easily’ Spoof Presidential Alerts"Hackers can use off-the-shelf equipment and open source software to exploit security vulnerabilities in LTE that could allow them to spoof presidential alerts disseminated to mobile devices, which could lead to panic and chaos. The attack designed by…
-
"New Research Reveals a Surprising World of IoT"A study has been done by researchers from Stanford University in which they examined user-initiated scans of 16 million homes and 83 million devices to further explore the use of Internet of Things (IoT) devices. From the analysis of scans and devices,…
News