Julian Assange has been sentenced to 11 months in prison for breaching his bail conditions in 2012 and finding asylum into Ecuadorian embassy for more than seven years. WikiLeaks founder Julian Assange has been sentenced to 50 weeks in prison for breaching his bail conditions in 2012 and finding asylum into Ecuador’s London embassy for […]
The US DHS issued a new Binding Operational Directive (BOD 19-02) instructing federal agencies and departments to patch critical flaws in within 15 days. The U.S. Department of Homeland Security (DHS) issued a new Binding Operational Directive (BOD 19-02) ordering federal agencies and departments quickly patch serious vulnerabilities in Internet-facing systems. The BOD 19-02 gives […]
Huawei made the headlines again, Vodafone identified backdoors in software that could have handed Huawei unauthorized access to the carrier’s fixed-line network. According to Bloomberg, Vodafone identified hidden backdoors in software that could have handed Huawei unauthorized access to the carrier’s fixed-line network in Italy used to connect to the internet. “Now Vodafone Group Plc […]
Aluminum producer Norsk Hydro estimated the cost of the massive attack cyber attack targeting the company in March at around $50 million. How much cost a security breach? I can tell you that potential damages could be very expensive for companies, for example, the transportation giant Maersk announced in 2017 that it would incur hundreds of […]
Facebook is going to fund academic research on the impact of social media on elections, aimed at preventing manipulation of these platforms. Facebook is committed to preventing manipulation of elections through social media by funding research on the impact of social media on elections. Facebook announced the involvement of 60 researchers from 30 academic institutions […]
A cyber survey conducted by the United Kingdomâs National Cyber Security Centre (NCSC) revealed that ‘123456’ is still the most hacked password. Security experts at the United Kingdomâs National Cyber Security Centre (NCSC) analyzed the 100,000 most-commonly re-occurring breached passwords using data from Have I Been Pwned (HIBP). Have I Been Pwned allows users to […]
Microsoft presented a series of security enhancements for its Windows 10, including the removal of the password-expiration policy. Microsoft announced the removal of the password-expiration policy from its operating system starting with the next Windows 10 feature update (Windows 10 version 1903, a.k.a., â19H1â ) and Windows Server version 1903. The idea behind this change […]
Researchers devised a new side-channel attack in Qualcomm technology, widely used by most Android smartphones, that could expose private keys. Researchers have uncovered a new side-channel attack that could be exploited by attackers to extract sensitive data from Qualcomm secure keystore, including private keys, and passwords. The attack potentially impacts most of the modern Android […]
US NIST updates its Automated Combinatorial Testing for Software (ACTS) research toolkit that should help experts in finding bugs in complex safety-critical applications. US NIST announced updated for its Automated Combinatorial Testing for Software (ACTS) research toolkit that should allow developers easily spot software errors in complex safety-critical applications. The ACTS toolkit allows development teams […]
WordPress-based eCommerce websites using the WooCommerce plugin are at risk of full compromise due to an unpatched vulnerability. A WordPress security firm called ‘Plugin Vulnerabilities’ has discovered a critical vulnerability in the WooCommerce plugin that exposes WordPress-based eCommerce websites to hack. The vulnerability affects the WooCommerce Checkout Manager plugin that allows owners of e-commerce websites […]