BBC: Wide-ranging security flaws have been flagged in the Covid-19 contact-tracing app being piloted in the Isle of Wight. The security… Read more Coronavirus: Security flaws found in NHS contact-tracing app
Category: Cyber
UK to launch specialist cyber force able to target terror groups
GCHQ and Ministry of Defence to roll out national task force of hackers after months of delay A specialist cyber… Read more UK to launch specialist cyber force able to target terror groups
“United Cyber Caliphate” Woman Sentenced in Georgia
Original source AUGUSTA, Ga. (WRDW/WAGT) — A Hephzibah woman accused of helping ISIS is expected to be sentenced in court… Read more “United Cyber Caliphate” Woman Sentenced in Georgia
YouTube Attacks to Watch Out For in 2019
“The two most common types of attacks include hoaxes targeting YouTube channel owners and ones that zero in on ordinary… Read more YouTube Attacks to Watch Out For in 2019
UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords
We at Ghost Security Group™ deal with Islamic State hackers attempting to breach web sites on a daily basis, either… Read more UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords
Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
“Currently, all modern Wi-Fi networks use WPA2 to protect transmitted data. However, because WPA2 is more than 14 years old,… Read more Dragonblood: Analysing Vulnerabilities in WPA3’s Dragonfly Handshake
NSA publicly releases their GHIDRA software reverse-engineering tool on GitHub
The National Security Agency has posted the latest release with complete source code of the GHIDRA software reverse engineering tool… Read more NSA publicly releases their GHIDRA software reverse-engineering tool on GitHub
Bots and botnets in 2018 | Securelist
Statistics on botnet attacks on clients of organizations Due to the wide media coverage of incidents involving Mirai and other… Read more Bots and botnets in 2018 | Securelist
New research reveals that the bloatware preinstalled on many new Android phones is invasive and largely unchecked.
The process of how a particular set of apps end up packaged together in the firmware of a device is not transparent, and various isolated cases reported over the last few years suggest that it lacks end-to-end control mechanisms to guarantee that shipped firmware is free from vulnerabilities or potentially malicious and unwanted apps.
Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018
Nearly half of the industrial control system (ICS) computers protected by Kaspersky Lab were targeted by malware and other threats… Read more Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018
You must be logged in to post a comment.