images provided by pixabay

New Type of Cyberattack Uses Wireless Charger to Set Your Smartphone...

0
Security experts from the University of Florida worked with CertiK and found a certain class of cyberattacks that could cause a smartphone to catch...
image provided by pixabay

A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...

0
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Image provided by pixabay

The Growing Need for Satellite Cybersecurity

0
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...
image provided by pixabay

WiFi Vulnerability Threatens Android Users

0
Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Fingerprint. image provided by pixabay

Hackers Can Use the Sound of Swiping to Steal Your Fingerprints

0
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
image provided by pixabay

Several Countries Join Forces to Smash the World’s Most Dangerous Cybergang

0
UK and US law enforcement led an international operation, successfully disrupting the Russian-linked ransomware specialist LockBit, one of the most harmful cybercrime groups in...
image provided by pixabay

New Tamper-Proof ID Tag Developed by MIT

0
MIT developers invent new tamper-proof ID tag that provides cheap and secure authentication – a cryptographic chip that is smaller and cheaper than RFID...
cyber security. image by pixabay

Criminals Break into Smart Homes by Jamming Wireless Security

0
A series of robberies in Minneapolis led police to believe that burglars are using WiFi jammers to block off security system signals from reaching...
image provided by pixabay

Enhanced Cybersecurity Measures Are Rooted in AI

0
A research team at Los Alamos National Laboratory has set a new world record in classifying malware families. They are doing so by using...
image provided by pixabay

Russian Worldwide Espionage Botnet Caught and Disrupted

0
The US Department of Justice claims to have taken down a global botnet controlled by GRU, Russia’s military intelligence agency. The botnet reportedly consisted...

“Unhackable” Computer Chip Works on Light

0
Researchers from the University of Pennsylvania developed a new computer chip that uses light instead of electricity, which can improve AI model training by...
images provided by pixabay

Cybergang DarkGate Uses CAPTCHA to Spread Malware

0
HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance...
images provided by pixabay

Cyberattack Disables Hospital for Days

0
Lurie Children's Hospital in Chicago has been disabled by a cyberattack for over a week, blocking doctors and nurses from accessing digital patient records, and...
images provided by pixabay

Microsoft Claims Adversary Countries are Using Generative AI For Cyber Operations

0
Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations. The tech giant...
image provided by pixabay

Monitoring Online Terror with AI

0
Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

Cybercriminals Create Malicious AI Chatbots

0
Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
image provided by pixabay

AI-Voice Robocalls Declared Illegal in the US

0
US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal. This phenomenon gained attention last month after...
image provided by pixabay

Hackers can Spy on Cameras Through Walls

0
Security cameras are our first line of defense in many fields of life, from our homes to the bank. But what if they aren't...
data and cyber. image by pixabay

Learning App Data Leaks – Exposing Millions

0
A mere misconfigured database has exposed more than two million user records on LectureNotes Learning App, a platform for sharing class notes. Back in December...
image provided by pixabay

68% Increase of Ransomware Attacks In 2023

0
The rise of ransomware-as-a-service gangs has brought with it a surge of 68% in known ransomware attacks last year, a record level, according to...
image provided by pixabay

Can Hackers Hijack Flights?

0
Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
image provided by pixabay

Higher Cyber Defense Leads to Higher Ransoms

0
Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured. According to Dutch victim data, the...

Latest

image provided by pixabay

“Responsible AI” – The Solution to the Deepfake Threat?

0
Several months ago, thousands of Democratic New Hampshire voters received a telephone call from none other than US President Joe Biden urging them not...