BlueKeep vulnerability in Windows is getting abused
Security researchers have spotted attacks utilising BlueKeep. BlueKeep is a vulnerability in older versions of Microsoft's Remote Desktop Protocol (RDP). The error was discovered in the May 2019 Patch.
However, the biggest fear people had regarding BlueKeep does not seem to have come true for th... Read more
New TLS protocol advances web security
Facebook, Cloudflare and the Mozilla Foundation have been collaborating to advance Transport Layer Security (TLS).
Strengthening web security
Individually, the companies released updates regarding security protocol Delegated Credentials. The new TLS protocol aims to strengthen web security an... Read more
Office 365 phishing campaign uses fake voicemails
Cybercriminals are constantly finding new ways to steal data
from victims. For example, a new phishing campaign uses fake voicemail
messages to convince targets to surrender their Office 365 credentials.
The campaign was discovered by McAfee security researchers, reports SiliconAngle.
The cam... Read more
‘Cybersecurity AI algorithms should become publicly available’
Algorithms and methodologies for artificial intelligence
(AI) and machine learning are becoming increasingly important in cybersecurity.
However, more cooperation between the various stakeholders is needed in order
to unlock the full potential of these technologies. By placing them in a public
AI F... Read more
WhatsApp sues Israeli company for spying on users
In May this year, WhatsApp was found to contain a vulnerability that allowed users to be eavesdropped on. Spyware from the Israeli company NSO Group was used for this purpose. The chat app has now taken the NSO Group to court because of the practices.
The NSO Group's spyware was found to be inst... Read more
‘Chinese hackers most active worldwide’
CrowdStrike reports that hackers working for the Chinese government are the most active worldwide. The company's most recent OverWatch research report states that hackers from China are as active as hackers from Russia, Vietnam, Iran and North Korea combined.
According to CrowdStrike, the Chines... Read more
Microsoft Azure Sphere publicly available next year
Azure Sphere, a Linux-based microcontroller (MCU) and associated cybersecurity service, will become generally available in February 2020. Microsoft announced this during the IoT Solutions World Congress.
Azure Sphere was earlier called Project Sopris. With this project, Microsoft wanted to devel... Read more
‘Older employees are more responsible about cyber security’
A study by NTT shows that employees over the age of 30 are more inclined to handle cyber security carefully than their younger colleagues. The study examined the behaviour of employees on the basis of seventeen criteria.
Employees under the age of 30 achieved a score of 2.3, while employees betw... Read more
BlackBerry secures mobile devices on the fly
More and
more mobile devices are appearing in the networks of large companies and organizations.
With Unified Endpoint Management (UEM), administrators try to manage and secure
this flow of devices as well as possible. With artificial intelligence (AI) and
the use of machine learning this can be a ... Read more
Linux vulnerability allows hackers to attack devices through wi-fi
The
Linux kernel has been found to contain an error, which provides hackers with the
opportunity to crash devices using Realtek's WiFi chips. In some cases, it is
also possible to take over devices. The error has existed for 6 years, until now.
The
vulnerability is located in the RTLWIFI driver,... Read more