Artificial Intelligence: Ally Or Enemy Of System Security?
The term “artificial intelligence” is now a keyword that has attracted a great deal of attention in the technological development of various fields. Image recognition, speech analysis, human interaction, medical use, surveillance camera security and economic analysis have an innovative impact on data management in the current day when data handling is commonplace. The existence
[ Read More ]Decade-old Avaya Phone Security Flaw, Patched At Last
Who can ever forget of Avaya phones and its near-monopoly of the corporate communication equipment market for Fortune 100 companies pre-Skype? As software VOIP solutions matured, companies are slowly but surely migrating away from hardware-based VOIP phones, including Avaya. For the last 10 years that Avaya ruled the offices, it harbored a remote code execution
[ Read More ]Aussie State Universities: Perennial Victims of Password Spray Attacks
Password Spray attack is not a new form of a cyber attack. But here, this may be the first article when we will discuss it in more detail. Password spray is a brute-forcing technique of using the same password but the username used varies. The purpose of this methodology is to bypass the IP address
[ Read More ]3 Fundamental Items To Have Web Security
Running a website is not easy from the standpoint of security and privacy. All web publishers are making a delicate balance between cost and security technologies, the more cyber defense ready the site, the higher the cost of running them. Any web developers worth his salt knows very well that TLS certificate is mandatory to
[ Read More ]Watering Hole Attacks Target Chinese-Speaking People Outside Of China
Compared to the classical phishing and social engineering attacks, the term watering hole attack is seldom given any attention by cybersecurity websites. It is a coverage something we need to amend, as contrary to the popular notion that such a campaign is very rare. It is a common occurrence but received less coverage than more
[ Read More ]Credential Stuffing Attacks State Farm Expose Customers To Identity Theft
State Farm, a behemoth in the banking and insurance business in the United States became a victim of massive credential stuffing attack. It is a form of cyber attack where usernames and passwords from a breached system are injected by bots against a website. With hopes that some stolen user credentials will be successful in
[ Read More ]Monzo Internal Data Breach Incident: Update App and Change PIN
Mobile-only bank, Monzo is the latest victim of a data breach, with the UK-based bank requesting their customers to change their PIN (Personal Identification Number). Upon initial inspection, the bank determined that the customers’ account PIN were recorded into log files which then were made accessible by their own staff. Monzo opened a blog entry
[ Read More ]Microsoft and Its Desire To Secure Global IoT Devices
The Microsoft Security Research and Defense (MSRD) team has issued a cybersecurity warning about the growing concerns of IoT (Internet-of-Things) security, especially botnet infections in their official blog. Redmond highlighted that IoT devices is forecasted to grow as much as 50-billion installations globally, with many devices having identified with security and privacy flaws fresh from
[ Read More ]More Fierce Ransomware Still On Horizon, Corporate Victims To Increase
IBM’s X-Force Incident Response and Intelligence Services (also known as IRIS) has issued a report, detailing the growth of destructive malware that infected the corporate space. The cybersecurity arm of Big Blue has disclosed that 12,316 corporate Internet-connected devices were rendered offline, costing $239 million to replace and reconfigure in an average malware attack for
[ Read More ]Suspected Ransomware Infections, Delays Houston County’s School
Alabama’s Houston County Schools are in a dilemma, as the start of its school year had to be delayed in order to buy more time in recovering from a malware attack. The school’s officials are tightlipped about what specific malware strain infected the schools’ networks. However, like what we have reported multiple times here, only
[ Read More ]