You are here:-CyberSecurity


North Korean Hackers Exploit Recently Patched Zero-Day

By | 2018-08-21T01:55:27+00:00 August 20th, 2018|Categories: CyberSecurity|

North Koren hackers are exploiting a recently patched vulnerability in Microsoft's VBScript engine vulnerability in live attacks, security researchers say. Tracked as CVE-2018-8373, the bug was identified as a memory corruption issue that would result in remote code execution in the context of the current user. The flaw resides in the manner in which

Anonymous Hackers Target Spain Sites in Catalonia Protest

By | 2018-08-21T00:57:29+00:00 August 20th, 2018|Categories: CyberSecurity|

Hackers from the Anonymous collective claimed responsibility for bringing down government websites in Spain on Monday in a protest against Madrid's efforts to block Catalonia's separatist drive. The sites, which included the official websites of the Constitutional Court and the economy and foreign ministries, went offline on Monday and could still not be

How Do I Make My Windows 10 Computer Run Faster? (Part 2) –

By | 2018-08-21T01:39:25+00:00 August 20th, 2018|Categories: CyberSecurity|

Nobody wants to endure the frustration of a poorly performing laptop or desktop. People just want their machines to work as intended, whenever they switch on or log-in. So whether your home PC is used for shopping, social media, storing important family photos and documents, remote working, or all of the above, our

Vulnerability in IP Relay Service Impacts Major Canadian ISPs

By | 2018-08-20T23:37:11+00:00 August 20th, 2018|Categories: CyberSecurity|

A recently addressed local file disclosure vulnerability in the SOLEO IP Relay service impacted nearly all major Internet service providers (ISPs) in Canada, a security researcher has discovered. Also known as telecommunications relay services (TRSs), the IP relays developed by Soleo Communications are available through all major ISPs in Canada. The cloud-based IP

Necurs Campaign Targets Banks | SecurityWeek.Com

By | 2018-08-20T22:39:36+00:00 August 20th, 2018|Categories: CyberSecurity|

A recently observed spam campaign powered by the infamous Necurs botnet has been specifically targeting banks with the FlawedAmmyy RAT, security researchers warn. First observed in 2012, the Necurs botnet is best known for the massive Locky ransomware campaigns that it powered in 2016 and 2017. Considered the largest spam botnet in the

Code of App Security Tool Posted to GitHub

By | 2018-08-20T21:50:48+00:00 August 20th, 2018|Categories: CyberSecurity|

Code of DexGuard, software designed to secure Android applications and software development kits (SDKs), was removed from GitHub last week, after being illegally posted on the platform. The tool is developed by Guardsquare, a company that specializes in hardening Android and iOS applications against both on-device and off-device attacks, and is designed to

NCC Group Releases Open Source DNS Rebinding Attack Tool

By | 2018-08-20T20:51:43+00:00 August 20th, 2018|Categories: CyberSecurity|

Cyber security and risk mitigation company NCC Group has released a new open source tool designed to make it easier for penetration testers and others to perform DNS rebinding attacks. DNS rebinding, an attack method that has been known for more than a decade, can allow a remote hacker to abuse a targeted

Senior Fundraising Strategist to Lead Philanthropic Efforts at RAND, Pardee RAND Graduate School

By | 2018-08-21T00:17:21+00:00 August 20th, 2018|Categories: CyberSecurity|

FOR RELEASE MondayAugust 20, 2018 Photo by Oszie Tarula Brandon Baker, a proven senior fundraising strategist whose experience includes helming a $250 million fundraising effort, has joined RAND's leadership team as vice president of development. In this newly created position, Baker will set strategy for philanthropic investment at RAND, a nonprofit research institution.

China Believes Its Cyber Capabilities Lag Behind US: Pentagon

By | 2018-08-20T20:01:31+00:00 August 20th, 2018|Categories: CyberSecurity|

China believes its cyberwarfare capabilities lag behind the United States, but it’s working on closing the gap, according to the U.S. Department of Defense (DOD). In its annual report to Congress, the Pentagon describes the cyber capabilities and cyber operations of the People's Liberation Army (PLA), and warns that China continues to launch

Industry Reactions to Foreshadow Flaws: Feedback Friday

By | 2018-08-18T04:33:34+00:00 August 17th, 2018|Categories: CyberSecurity|

Researchers and several major tech companies this week disclosed the details of three new speculative execution side-channel vulnerabilities affecting Intel processors. The flaws, tracked as Foreshadow and L1 Terminal Fault (L1TF), are CVE-2018-3615, which impacts Intel’s Software Guard Extensions (SGX); CVE-2018-3620, which impacts operating systems and System Management Mode (SMM); and CVE-2018-3646, which