There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions…
BlackBerry Announces Automotive Security Solution
BlackBerry this week announced a customizable automotive solution designed to help OEMs improve vehicle health and security. The solution aims to provide the necessary foundation to “future-proof” vehicles, as well as to help accelerate development timelines and reduce the cost…
Texas and Las Vegas become victims to Iran Cyber Attacks
As the world is expecting a World War 3 by this month-end between Iran and North America, Garvin Bushell, Vice President of Cyber World Institute thinks that the war will happen not with guns and bullets, but only through cyberattacks…
Nigerian Betting Company Denies Breach
SureBet247 has described reports that it was breached as “false info” Advertise on IT Security News. Read the complete article: Nigerian Betting Company Denies Breach
Las Vegas Reports Cyber Attack; Extent of Breach Unclear
Las Vegas officials said Tuesday that that a cyber attack breached the city’s computer systems, but it wasn’t immediately clear if any sensitive data was compromised. read more Advertise on IT Security News. Read the complete article: Las Vegas…
MITRE presents ATT&CK for ICS, a knowledge base for ICS
MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). MITRE’s ATT&CK framework is becoming a standard in cybersecurity community for the classification of attacker behavior. Now the organization…
Apple exec explains privacy protections, while Facebook leader looks for loopholes
At CES 2020, Facebook privacy officer says new California law doesn’t apply because the company doesn’t sell data, only ads. Advertise on IT Security News. Read the complete article: Apple exec explains privacy protections, while Facebook leader looks for…
China-Made TikTok App Riddled With Security Holes: Researchers
Researchers Have Discovered Multiple Security Vulnerabilities Within the Popular TikTok Application read more Advertise on IT Security News. Read the complete article: China-Made TikTok App Riddled With Security Holes: Researchers
INTERPOL Collaboration Reduces Cryptojacking by 78%
Cybercriminals are often seen as having the upper hand over the “white hat” community. After all, they’re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there’s one secret weapon the…
Google Project Zero is moving to complete 90-day patch adoption
Vendors are allowed to have 90 days to fix bugs, under adjustments to the transparency policies of Google Project Zero. Project Zero, the team of elite security researchers from Google,… The post Google Project Zero is moving to complete 90-day…
Cyber Attack Alert! Microsoft Gives Inside Revelations About RDP Brute Force Attacks
Microsoft conducted a long-term study, which majorly focused on RDP brute-force attacks, their success and the duration they last for. Per sources, according to the reports of the study, over 0.8% of the RDP brute force attacks on an average…
The “Art of Cloud War” for Business-Critical Data
How business executives’ best intentions may be negatively affecting security and risk mitigation strategies – and exposing weaknesses in organizational defenses. Advertise on IT Security News. Read the complete article: The “Art of Cloud War” for Business-Critical Data