Cyber Security

0 Comments
Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable Researchers at New York University have come up with an unconventional defensive technique that could ultimately deter attackers from even trying to write exploits targeting software vulnerabilities. In a departure with the usual ways of addressing bugs, which normally involve eliminating known
0 Comments
The first week in security video round-up from WeLiveSecurity Welcome to the first ever week in security video round-up. This weekly video will bring you some of the biggest industry news that we have covered here on WeLiveSecurity. The videos will be presented by ESET’s Global Security Evangelist & Industry Ambassador Tony Anscombe. In this
0 Comments
If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later Hundreds of Instagram users are reportedly experiencing an apparently coordinated hack, leaving them with their accounts hijacked and personal information altered – all the while
0 Comments
Aiming to protect critical infrastructure against attacks Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are
0 Comments
The nature of the vulnerability hasn’t been disclosed, but is said to have already been identified and fixed Several hundred inmates at five prisons in the northwestern US state of Idaho have exploited a software vulnerability in their “prison-specific” tablets to transfer $225,000 worth of digital credits to their virtual accounts, according to a BBC
0 Comments
But don’t get too excited just yet: the first-of-its-kind bug bounty program for printers is invite-only for now Researchers can earn up to $10,000 for identifying security flaws in printers made by HP in what is the first bug bounty program aimed specifically at printers, according to an announcement by the tech giant on Tuesday.
0 Comments
Federal agency issues Notices of Violation to Datablocks and Sunlight Media for allegedly facilitating the installation of malware through online advertising On July 11, 2018, the Canadian Radio-television and Telecommunications Commission (CRTC) imposed sanctions against the installation of malicious software through online advertising for the first time in its history. This decision was taken under the provisions
0 Comments
A study assessed whether or not the most popular English-language websites help users strengthen their security by providing them with guidance on creating safer passwords during account sign-up or password-change processes Some of the Internet’s biggest names largely fall short of nudging users towards safer choices when they create or change their passwords, a study
0 Comments
Patches have already been released or are expected to see the light of day soon Researchers have discovered a flaw in some Bluetooth implementations that could allow an attacker to intercept or tamper with data exchanged between two vulnerable devices. The cryptographic bug, tracked as CVE-2018-5383, has been identified by scientists at the Israel Institute
0 Comments
It might seem legit but there are several reasons why you should not always hit the panic button when someone claims to have your email password In the official trailer to a 1965 horror-thriller film, a series of land-line telephone handsets (remember them?) are shown ringing, and the voice-over says in an increasingly urgent voice,
0 Comments
This is bad news for many websites that have yet to embrace encrypted connections Google has rolled out the much-anticipated version 68 of its Chrome browser that, most importantly, labels HTTP websites as “Not secure”. Available for Windows, Mac and Linux, Chrome’s latest iteration inserts a “not secure” indicator to the left of the URL
0 Comments
The company credits hardware-based two-factor authentication with practically eliminating the problem of phishing attacks that have targeted its own employees of late Google has announced a hardware security key that is intended to keep users of its services safe from account-takeover attacks. Dubbed “Titan Security Key”, the piece of hardware includes firmware developed by Google