Cybersecurity News

Top Software Testing Services

Researcher Demonstrate Hacking of 3D Printer by Triggering a Fire

A senior security consultant at Coalfire, Dan McInerney, published a three-part blog where he talks about the threats that modern-day IoT devices pose through an experiment. The experiment exposes the possibility of physical harm that the exploitation of these devices can cause even remotely. Such devices contain heating elements that can be weaponized by the attackers for…
Read more

Energy Market Manipulations Using IoT Botnets

The Dark Reading recently interviewed Tohid Shekari, a Ph.D. candidate at Georgia Tech, concerning his work with Raheem Beyah about using the IoT botnets in a stealthy way for manipulating the energy markets.  According to Tohid, IoT botnets have been recently used to attack the auto domains. The attacks started to emerge in the field…
Read more

$10 Million Reward by RJF to Catch Cyber Intruders

The United States of America will be having its presidential elections in November 2020. This is a crucial period when the intruders will be trying to compromise the critical information related to the campaigns for undermining the election process.  During the 2016 Presidential elections, Russian hackers had leaked Hillary Clinton’s emails and documents to turn…
Read more

WhatsApp ‘hijacking’ Resurfaces again

The WhatsApp hack that has been in the news for a year has seen a recent spike in the number of attacks since the novel coronavirus pandemic has hit the world. An audio message of the recent hack victim Deepa Lekshmi went viral on WhatsApp, where she recounted her plight of her WhatsApp account being…
Read more

New Vulnerability ‘Boothole’ Threatens Billions of Linux, Windows Devices

A new vulnerability, named BootHole, has been discovered recently by two Eclypsium researchers, Mickey Shkatov and Jesse Michael, in the GRUB2 bootloader. Most Linux systems utilize GRUB2. It also supports other operating systems such as kernel and hypervisor. According to the release, almost all signed versions of GRUB2 are vulnerable, even if they have enabled…
Read more

US intelligence authorities warns of new strain of chinese virus ‘Taidoor’

A Chinese virus named Taidoor has been recently reported as a potential threat by the US government in its Malware Analysis Report (MAR) jointly released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD). The virus poses a threat mainly because of its ever-evolving…
Read more

Latest NSA Guidelines for Limiting Location Data Exposure

The National Security Agency has recently issued an advisory about the threats imposed upon by the exposure of the location data of the users. The report vividly explains how the location data can be accessed via different mediums and what we, as users, can do to ensure minimum data breach.

The timeless timing attack- a more efficient way of remote timing attacks.

Recently, a white paper has been released by researchers at the Center for Cyber Security, New York University, Abu Dhabi, which has introduced a new type of attack. The attack is claimed to be a more efficient version of the remote, timeless attack and is named as Timeless Timing attack. Conventionally in a remote timing…
Read more

Apple’s Touch Id- a possible gateway to your iCloud account?

A security specialist at an IT firm Computest, Thijs Alkemade, found a security flaw in Apple’s Touch ID feature in February. This possible security breach could leave the iCloud accounts of the apple users vulnerable and accessible to the attackers when apple’s touch Id feature is used for verification. Authentication Flaw According to the specialist,…
Read more

Frustrated Researcher Drops Two Tor Zero-days Vulnerabilities

The Tor browser is used by users worldwide because of the security and privacy it provides to its users. It works on the principle of Onion Routing, which routes traffic through multiple servers and is encrypted each step of the way. This mechanism makes it difficult to trace what is viewed by the user.  However,…
Read more