WPA3 Takes Wi-fi Security to the Next Level, Following the Krack Attack

A new announcement has been made in regards of the Wi-Fi Alliance (the organization managing wireless internet technologies): the official release of WPA3 is already a fact: Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3™, the next generati… Continue reading WPA3 Takes Wi-fi Security to the Next Level, Following the Krack Attack

Android P to Get Better Biometrics against Spoofing Attacks

A new anti-spoofing feature is about to be introduced to Android which will make biometric authentication mechanisms more secure. As explained by Google: To keep users safe, most apps and devices have an authentication mechanism, or a way to prove…Re… Continue reading Android P to Get Better Biometrics against Spoofing Attacks

Encrypted GZipDe Malware Distributes Metasploit Backdoor

A new piece of, what appears to be, highly targeted malware has been discovered by researchers at AlienVault. The new malware strain, dubbed GzipDe and most likely used in cyber-espionage campaigns, uses an article about the next Shanghai Cooperation O… Continue reading Encrypted GZipDe Malware Distributes Metasploit Backdoor

7 Vulnerabilities in 400 Axis Camera Models Unearthed (CVE-2018-10658)

Several critical vulnerabilities have been uncovered in some 400 Axis camera models. The flaws could allow hackers to take full control over the affected camera or entangle them in botnets. VDOO researchers unearthed the vulnerabilities that could be c… Continue reading 7 Vulnerabilities in 400 Axis Camera Models Unearthed (CVE-2018-10658)

CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

An independent security researcher has uncovered by accident quite the unusual, high-severity browser vulnerability in Microsoft Edge, identified as CVE-2018-8235. Shortly put, the vulnerability would allow a malicious website to recapture content from… Continue reading CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

Has Tether Been Used to Manipulate Bitcoin’s Value Boost?

According to two researchers from University of Texas, there is a particular reason that blew the price of Bitcoin out of proportion last year. Professor John Griffin and graduate student Amin Shams believe that Bitcoin’s value boost was due to….. Continue reading Has Tether Been Used to Manipulate Bitcoin’s Value Boost?

CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

Yet another chip vulnerability has been discovered, CVE-2018-3665, which has been called Floating Point Lazy State Save/Restore. The flaw resides in Intel Core and Xeon processors, and is similar to Spectre since it is a speculative execution flaw. Rel… Continue reading CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

Malicious Code Can Look Like It Has Been Signed by Apple

Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API can be exploited … Continue reading Malicious Code Can Look Like It Has Been Signed by Apple

$1.1 Billion in Cryptocurrency Theft Since December 2017

According to many experts in the cybersecurity field and to statistics as well, Bitcoin is no longer be the most preferable cryptocurrency used by cybercriminals in their operations. Bitcoin’s high profile and lack of complete anonymity has made … Continue reading $1.1 Billion in Cryptocurrency Theft Since December 2017

Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three vulnerabilities have been found in Foscam security cameras. Owners of such cameras are urged to update as soon as possible. The flaws are described as an arbitrary file-deletion bug, a shell command-injection bug and a stack-based buffer oferflow… Continue reading Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)