RAMpage Attack Explained—Exploiting RowHammer On Android Again!
A team of security researchers has discovered a new set of techniques that could allow hackers to bypass all kind of present mitigations put in place to prevent DMA-based Rowhammer attacks against Android devices. Dubbed RAMpage, the new technique (CVE-2018-9442) could re-enable an unprivileged Android…
Ticketmaster Suffers Security Breach – Personal and Payment Data Stolen
Global entertainment ticketing service Ticketmaster has admitted that the company has suffered a security breach, warning customers that their personal and payment information may have been accessed by an unknown third-party. The company has blamed a third-party support customer service chat application for the data…
Maker of popular quiz apps on Facebook exposed personal data of 120 million users
A developer of Facebook quizzes under the brand NameTests has been found to have exposed the personal information of as many as 120 million Facebook users, according to a report from TechCrunch. The company behind NameTests, German app maker Social Sweethearts, created popular social quizzes…
Microsoft’s Azure IoT Edge enters general availability, new features added
Microsoft has announced that its Azure IoT edge solution has entered general availability, allowing the company’s enterprise customers to bring their edge solutions to production. Azure IoT edge is a fully managed service that delivers cloud intelligence locally by deploying and running artificial intelligence (AI),…
Defending Against Illicit Cryptocurrency Mining Activity
The popularity of cryptocurrency, a form of digital currency, is rising; Bitcoin, Litecoin, Monero, Ethereum, and Ripple are just a few types of the cryptocurrencies available. Though cryptocurrency is a common topic of conversation, many people lack a basic understanding of cryptocurrency and the risks…
New Malware Family Uses Custom UDP Protocol for C&C Communications
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking group behind KHRAT backdoor Trojan and has been targeting organizations in South East Asia. According to researchers from Palo Alto, the hacking group, which they dubbed…
Wi-Fi WPA3 security is here, along with Easy Connect for IoT
Wi-Fi is pretty much the wireless technology that binds us all to the Internet. Given the prevalence of laptops and mobile devices and the costs of cellular data like LTE, Wi-Fi is still the preferred way to connect to the Internet both at home and…
Stay connected