Germany has decided to level the playing field and offer all foreign companies fair and equal chances to build the national 5G infrastructure. Huawei has responded, claiming that despite the warnings of the United States, they will be able to comply and meet these standards.
- By Kaitlyn DeHaven
- Jun 26, 2019
A new cryptocurrency-mining botnet could severely affect unprotected Android users. Experts say while the unprotected devices are mostly phones in Asia, these issues are becoming a big problem for technology security.
- By Kaitlyn DeHaven
- Jun 26, 2019
The IoT Cybersecurity bill, which was introduced in March, passed through the Senate Homeland Security and Governmental Affairs last week and is now headed to the full Senate for a vote.
- By Kaitlyn DeHaven
- Jun 25, 2019
After a Facebook user discovered that the old Nest owners were able to see screenshots from their Nest’s new home, even after factory resets, Google quickly stepped in to resolve the security issue.
- By Kaitlyn DeHaven
- Jun 24, 2019
Users’ data might be more at risk than they realize. A new study shows that three quarters of mobile application have insecure data storage issues, putting passwords, financial information, personal data, and correspondence at risk.
- By Kaitlyn DeHaven
- Jun 24, 2019
After three weeks of city data being encrypted in Riviera Beach, Florida, city officials have unanimously voted to pay the hefty ransom to regain access.
- By Kaitlyn DeHaven
- Jun 21, 2019
Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.
- By Kaitlyn DeHaven
- Jun 20, 2019
In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.
- By Kaitlyn DeHaven
- Jun 20, 2019
In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.
- By Kaitlyn DeHaven
- Jun 19, 2019
A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.
- By Kaitlyn DeHaven
- Jun 19, 2019
It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.
- By Kaitlyn DeHaven
- Jun 18, 2019
Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.
- By Kaitlyn DeHaven
- Jun 17, 2019
Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.
- By Kaitlyn DeHaven
- Jun 14, 2019
Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.
- By Terry Hearn
- Jun 14, 2019
An DDoS attack aimed at slowing connectivity for the Telegram app took place this week. The cyberattack coincided with large protests in Hong Kong, and with most of the IP addresses coming from China, it is speculated that they were involved in the attack.
- By Kaitlyn DeHaven
- Jun 14, 2019
Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.
- By Kaitlyn DeHaven
- Jun 13, 2019
Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.
- By Kaitlyn DeHaven
- Jun 13, 2019
A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised.
- By Kaitlyn DeHaven
- Jun 12, 2019
A group of 14 Stanford scholars put together a report of recommendations for increased election security, addressing problems of cybersecurity, ballot security, and election transparency.
- By Kaitlyn DeHaven
- Jun 11, 2019
Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.
- By Kaitlyn DeHaven
- Jun 07, 2019