Tech news from MIST
Latest news from CyberManipal, that matters.
Page 6
BREACHES
Major Southeast Asian Countries targeted by Chinese hackers
3 years ago
Series of attacks targeting at least five major telecommunications companies located in Southeast Asian countries have been hacked since 2017. According to reports, the goal of these hackers is to gain and maintain continuous access to telecommunication providers and to facilitate cyber espionage by collecting sensitive information, compromising high-profile business... Read more
Series of attacks targeting at least five major telecommunications companies located in Southeast Asian countries... Read more
RESEARCH AND DEVELOPMENT
UK universities awarded funding for research into IoT
3 years ago
A grant has been awarded to various British colleges to explore security issues encompassing Internet of Things (IoT). Reported on July 13, the 'PrivIoT' project driven by Dr. James Nicholson, a speaker at Northumbria University's Computer and Information Sciences office, will likewise include scholastics from Royal Holloway, Manchester, and Nottingham... Read more
A grant has been awarded to various British colleges to explore security issues encompassing Internet... Read more
BREACHES
Hacker 'Praying Mantis' targets Microsoft web servers, says Sygnia
3 years ago
According to Sygnia, a cybersecurity technology and services provider, the hacker “Praying Mantis” or ”TG1021” is targeting Windows Internet Information Services(IIS) servers using a variety of deserialization exploits, web applications using vulnerabilities and a completely volatile and custom malware framework tailor-made for IIS servers. The Tel Aviv-based firm also suggested... Read more
According to Sygnia, a cybersecurity technology and services provider, the hacker “Praying Mantis” or ”TG1021”... Read more
BREACHES
Pandemic has resulted in a spike in data breach costs, says IBM
3 years ago
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by IBM security, data-breach expenses have increased over 10% in the last year. The research considers various costs linked to Data Breaches, including legal, operations of technology, customer loss, brand worth, and a lot more aspects.... Read more
According to Ponemon Institute's 'The Cost of a Data Breach Report,' sponsored and analyzed by... Read more
RESEARCH AND DEVELOPMENT
Easy Secure Photos algo to encrypt images on the cloud
3 years ago
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that encrypts photos uploaded to any cloud service like Google Photos or iCloud without making any changes to the services themselves. The encryption of photos on the cloud was a huge problem since most lcoud services... Read more
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that... Read more
POLICIES AND REGULATIONS
China imposes restrictions on zero-day vulnerability researchers
3 years ago
The Chinese government has mandated that any Chinese citizen who finds a zero-day vulnerability must pass the details to only the Chinese government and not to any third-party outside China. A zero-day vulnerability is a computer-software vulnerability unknown to those who work towards resolving those very bugs. Hence, until the... Read more
The Chinese government has mandated that any Chinese citizen who finds a zero-day vulnerability must... Read more
BREACHES
Chain-reaction ransomware attack on the Fourth of July
3 years ago
Ransomware criminals broke into networks and sow malware that cripples networks, affecting financial services, travel, leisure, and the public agencies in at least 17 countries, including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya. This attack was claimed by an affiliate of Russia's notorious REvil... Read more
Ransomware criminals broke into networks and sow malware that cripples networks, affecting financial services, travel,... Read more
BREACHES
LinkedIn suffers data breach of 700 Million users
3 years ago
LinkedIn experienced another massive data breach this year that exposed data of over 700 million users, thus compromising the data of more than 92 percent of its users. The new dataset obtained by an unknown hacker is said to consist of personal details of LinkedIn users, including phone numbers, physical... Read more
LinkedIn experienced another massive data breach this year that exposed data of over 700 million... Read more
RESEARCH AND DEVELOPMENT
Web source code NFT sold at $5.4m
3 years ago
NFTs are certificates of ownership for digital assets, with most of them not having a physical representation. They do not necessarily include copyright control and hence it is regarded as a get-rich-quick scheme by critics. Recently the World Wide Web creator Sir Tim Berners-Lee sold the NFT in an auction... Read more
NFTs are certificates of ownership for digital assets, with most of them not having a... Read more
VULNERABILITIES
Hidden Linux RPM bug discovered after decades
3 years ago
Red Hat has used RPM for software package distribution for decades with no prior known bugs or vulnerability. Now, they have learned the existence of a hidden security bug that has been active since its creation. However, a repair patch has been submitted as soon as it was discovered. ... Read more
Red Hat has used RPM for software package distribution for decades with no prior known... Read more