research
![fake Cisco device](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/14102716/fake-cisco-device-400x200.jpg)
Investigation highlights the dangers of using counterfeit Cisco switches
An investigation, which concluded that counterfeit network switches were designed to bypass processes that authenticate system components, illustrates the security challenges …
![BGU Zoom research](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13195344/bgu-zoom-400x200.jpg)
Researchers extract personal data from video conference screenshots
Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …
![MongoDB](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/07113702/mongodb-red-400x200.jpg)
MongoDB is subject to continual attacks when exposed to the internet
On average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database …
![camera](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104835/camera-400x200.jpg)
Exposing the privacy risks of home security cameras
An international study has used data from a major provider of home IP security cameras to evaluate potential privacy risks for users. Privacy-compromising information IP home …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
New privacy-preserving SSO algorithm hides user info from third parties
Over the last few decades, as the information era has matured, it has shaped the world of cryptography and made it a varied landscape. Amongst the myriad of encoding methods …
![Privacy Shield](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114002/privacy-shield-item-400x200.jpg)
Researchers create tool for protecting children’s online privacy
A University of Texas at Dallas study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Dr. Kanad Basu, …
![voice](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/23162702/voice-devices-400x200.jpg)
New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Does a generalization of tracking data cover up our traces on the internet?
Tracking of our browsing behavior is part of the daily routine of internet use. Companies use it to adapt ads to the personal needs of potential clients or to measure their …
![Quantum programming language](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/16112931/quantum-p-language-400x200.jpg)
Silq: Programming quantum computers made easy
Programming quantum computers is becoming easier: computer scientists at ETH Zurich have designed the first programming language that can be used to program quantum computers …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
UPnP vulnerability lets attackers steal data, scan internal networks
A vulnerability (CVE-2020-12695) in Universal Plug and Play (UPnP), which is implemented in billions of networked and IoT devices – personal computers, printers, mobile …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093746/cloud-money2-400x200.jpg)
OPTIMUSCLOUD: Cost and performance efficiency for cloud-hosted databases
A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based databases. Her …
![IoT security label](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/03095603/iot_security_label-400x200.jpg)
Researchers develop IoT security and privacy label
When hungry consumers want to know how many calories are in a bag of chips, they can check the nutrition label on the bag. When those same consumers want to check the security …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD