Security researchers at Security Explorations have found more than 30 vulnerabilities in the Google App Engine that allow code execution and sandbox escapes A team of security researchers in Poland announced to have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that could be exploited by hackers […]
A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under evaluation is affected by vulnerabilities and other security issues. The data is part of a study conducted by the China Software Testing Center under the Chinese […]
The System-Aware Secure Sentinel system is the solution able to prevent cyber attacks against drones by detecting “illogical behaviors” of the vehicle. The US Defense has sponsored the development of the System-Aware Secure Sentinel, a system to shield unmanned aerial vehicles from cyber-attacks. The system developed with funds from the US Department of Defense, the […]
The experts at IBM have found several problems in implementation of the social login authentication of several identity providers. The researchers at IBM’s X Force security discovered a way to gain access to Web accounts by exploiting misconfiguration in some social login services. Social login, also known as social single sign-in, is a form of single […]
Google has simplified the authentication process by introducing an updated CAPTCHA that simply asks users whether they are a bot. Google’s new API simplifies the reCAPTCHA experience, product manager Vinay Shet said. Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of […]
Security researcher Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files of SCADA and ICS software. The cyber security expert Billy Rios has created WhiteScope, a database containing hundreds of thousands of “known-good” files from makers of SCADA and ICS software with the intent to support users to identify legitimate ICS/SCADA files. “WhiteScope has over […]
The Reuters has reported that the FBI issued a confidential warning to US businesses following the destructive malware based attack on Sony Pictures. Following the major breach breach at Sony Pictures Entertainment, the FBI issued an alert to U.S. businesses related to possible malware-based attacks. According the Reuters Agency, the malicious code described in the alert could be the attack […]
ENISA has presented at the workshop on National Cyber Security Strategies in Brussels the Evaluation Framework on National Cyber Security Strategies (NCSS). ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS), an important work that addressed to policy experts and government officials that are in charge for the implementation and evaluation of an NCSS policy. The work […]
A researcher at Google discovered a critical flaw in Windows Acrobat Reader 11 Sandbox that could be exploited to access a system and gain higher privileges Google security researcher James Forshaw claims that the Acrobat Reader Windows sandbox is affected by critical vulnerability that could allow attackers to compromise a system and gain higher privileges. “The […]
The industrial supplier Siemens has patched two critical vulnerabilities in its solutions, Siemens WinCC application in use must be updated urgently. The industrial supplier Siemens has patched two critical vulnerabilities in the Siemens application that bad actors are exploiting in the wild. Siemens has also informed its customers that its researchers are already working on updates […]