Secure networks are the key to unlocking A2P potential
75% of mobile network operators (MNOs) do not have the measures in place to control and monetize Application-to-Person (A2P) SMS traffic that traverses their network, …
WiFi jamming attacks more simple and cheaper than ever
A security researcher has demonstrated that jamming WiFi, Bluetooth, and Zigbee networks is not difficult to perform but, most importantly, also not as costly as one might …
America’s Thrift Stores breached by Eastern European criminals
America’s Thrift Stores, a for-profit organization that operates thrift stores in Alabama, Georgia, Louisiana, Mississippi and Tennessee, is the victim of a data …
Cybersecurity expectations: Myth and reality
Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online, according to Intercede.The number of …
Compliance vs. cybersecurity: Insurers face competing priorities
Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, …
Android ransomware gets new, professional look thanks to Googles Material Design
“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …
Thousands of Zhone SOHO routers can be easily hijacked
Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …
Chinese hackers arrested at US request
Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …
GnuPG 2.1.9 released
The GNU Privacy Guard (GnuPG) is a complete and free implementation of the OpenPGP standard which is commonly abbreviated as PGP. It allows to encrypt and sign data and …
Authentication bypass flaw in Netgear SOHO routers exploited in the wild
A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …
Theoretical computer science provides answers to data privacy problem
The promise of big data lies in researchers’ ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the …
Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones
Here’s an overview of some of last week’s most interesting news and articles:The price of the Internet of Things will be a vague dread of a malicious …