Security News
Vulnerabilities Found in APIs Controlling Croatia-Based Zipato's IoT DevicesFindings from researchers who hacked Croatia-based vendor Zipato's smart hub controllers, which can manage networked...
Several months after a researcher issued a warning about over 1,200 Phoenix Contact programmable logic controllers (PLCs) being exposed to remote attacks from the internet, many organizations...
BlackBerry Cylance security researchers have analyzed a suite of remote access Trojans (RATs) that the Vietnam-linked threat actor OceanLotus has been using in attacks for the past three years. read more
There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted file-sharing services,...
Presidential Alerts that all modern cell phones in the United States are required to receive and display as part of the Wireless Emergency Alert (WEA) program can be spoofed, researchers have...
Thanks in large part to a counter-phishing product. Doh! The criminals behind the Wipro phishing attack from earlier this year also targeted Western Union, Expedia, Rackspace and a whole host of...
Researchers have shown that it’s technically possible for hackers to target the US Presidential text Alerts system to send fake messages.
Spurred by the panic-inducing fake alarm about an inbound ballistic missile received by Hawaii residents in January 2018, a group of researchers from University of Colorado Boulder wanted to check...
The language we use could be indicators of disease and, with patient consent, could be monitored just like physical symptoms.
A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms ‘learn’ from the data they are trained on to...