Industry News

vulnerabilities

New Bluetooth Protocol Chips Plagued by BleedingBit Bug

Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE...
Continue Reading
Healthcare Data Breach

75K Individual Data Exposed on Healthcare.Gov Data Breach

New detailed information has surfaced about a data rupture primarily involving the Healthcare.gov web portal. The information rupture that was first given an account of October 19 influenced to upwards of 75,000 shoppers.   As a result, starting the week of November 5, the Marketplace was phoning those impacted. Following the call, a letter detailing...
Continue Reading
Data Breach

Data Breach at Nordstrom Exposed Employees’ Data

Nordstorm’s lead store in Seattle endured a break that uncovered a portion of its representatives’ delicate data. Despite the fact that the organization has not uncovered the quantity of representatives influenced by the break, Nordstorm has started informing its workers as a part of a breach warning protocol.   Nordstorm uncovered that it found the...
Continue Reading
Routers Botnet

100K SoHo Routers Taken Over by A Botnet

A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before...
Continue Reading
China Telecoms Traffic

Oracle Confirms China Telecoms Traffic Misdirections

Oracle’s Internet Intelligence division has affirmed today the discoveries of a scholastic paper distributed two weeks prior that blamed China for “seizing the crucial web spine of western nations.”   The examination paper was created by scientists from the US Naval War College and Tel Aviv University and it made many waves online after it...
Continue Reading
Data of Moscow’s Elite Leaked in Telecom Incident

Data of Moscow’s Elite Leaked in Telecom Incident

Thousands of wealthy Moscow residents who subscribed to a regional internet provider have had personal data including names, home addresses and mobile numbers posted online. People affected by the high-profile data leak are all clients of Moscow-based internet provider Akado Telecom, a large telecommunications network owned by billionaire businessman Viktor Vekselberg, which said it had...
Continue Reading
Cisco Network Products

Cisco Network Products Affected By Bug

Cisco is currently looking into its product line to determine which products and services use Linux kernel 3.9 or above, which is vulnerable to the FragmentSmack denial-of-service (DoS) bug.  The networking hardware manufacturer already assembled a list of more than 80 products that are affected by the vulnerability. Many of them expect a fix by...
Continue Reading
Hotel Guest Fined for Hacking Hotel Wifi

Hotel Guest Fined for Hacking Hotel Wifi

A security engineer from Chinese multinational company Tencent hacked into the WiFi system of a hotel in Singapore and received a fine for publicly disclosing administrator login passwords. Zheng Dutao participated in the capture-the-flag competition during the Hack InThe Box security conference in Singapore at the end of August and decided to test the WiFi...
Continue Reading
The Uncertain Future of Gaming Technologies

The Uncertain Future of Gaming Technologies

People spend 2.5 billion minutes a day playing League of Legends.” That was part of the keynote speech from Jane McGonigal, Director of game research and development for the Institute for the Future at the 2018 Security Congress. To put that in perspective, that’s the equivalent of having a company of more than 20 million...
Continue Reading