25 Sep 2020

Cisco warns over 25 high-impact flaws in its IOS and IOS XE software

Cisco is urging customers to install patches for 25 high severity flaws existing in its previous version of IOS and ISO XE networking gear software. In total, Cisco disclosed and patched 34 flaws, 25 of which were classified as critical. The announcement is part of Cisco’s semi-annual effort to fix

Read More
21 May 2020

New PipeMon malware uses Windows print processors for persistence

The Winnti hacking group has targeted video game companies again in a new campaign that utilizes recent malware called PipeMon, a modular backdoor that was identified earlier this year. PipeMon was discovered on servers belonging to video game developers of games that feature multiplayer options (massively multiplayer online) games. The

Read More
12 May 2020

Quantum Hardware Could Cut AI Power Needs

Researchers have reported that hardware that can learn skills through using a certain type of artificial intelligence could dramatically cut the power requirements of AI. Sharing intelligence features between hardware and software would also offset the energy needed for deploying AI in advanced applications, including self-driving cars. AI can require

Read More
28 Feb 2020

Apple Just Demanded Santander And A $50 Billion US Intelligence Contractor Reveal How They Use iPhone Hacking Tech

Apple has subpoenaed Santander Bank and the intelligence contractor L3Harris Technologies, aiming to learn more about the companies’ use of Correllium, a cybersecurity startup that the tech giant is suing. Apple is suing Correllium after the startup created tech that produced software versions of iPhones for security and functionality testing.

Read More
25 Feb 2020

Apple Takes Heat Over ‘Vulnerable’ iOS Cut-and-Paste Data

German software engineer Tommy Mysk has developed rogue proof of concept (PoC) app called KlipboardSpy to demonstrate how any cut and paste data stored temporarily on an iPhone or iPad’s memory can be accessed by all apps installed on the specific device. This means that malicious apps could potentially have

Read More
10 Feb 2020

UK Government Under Fire Over NSO Group Links

The British government has faced criticism after deciding to invite the controversial espionage software provider NSO Group to a secret security trade fair upcoming next month. The government will host the firm, which is based in Israel, as an exhibitor at the closed-door event. The NSO Group currently faces a

Read More
09 Jan 2020

Google Removed Over 1.7K Joker Malware Infected Apps from Play Store

Google has removed 1,700 applications compromised by the Joker Android malware from its Google Play Store to protect consumers from the harmful software. The infected applications have been detected and removed since 2017 when the company began tracking the uploads. CSIS Security Group researchers found 24 apps with over 400,000

Read More
07 Jan 2020

Facial recognition hardware to reach over 800 million devices by 2024

Juniper Research recently published a report that found that facial recognition hardware will be the fastest evolving and growing industry in terms of smartphone biometric hardware. Juniper Research concluded that it will reach over 800 million in 2024 compared to an estimated 96 million users in 2019. The report stated

Read More
09 Dec 2019

Chinese government to replace foreign hardware and software within three years

In a government directive issued to public institutions earlier this spring, Beijing officials have ordered the government offices and public institutions of China to replace foreign hardware and software with alternatives constructed in China within the next three years. The directive is known as 3-5-2, based on the percentage targets

Read More