Can quantum compass replace GPS?

Time and again it has been proved that it is not possible to get GPS signals everywhere on Earth. But no worries! Places where GPS can’t reach, now world’s first Quantum compass will be able to do so.

Seven new Meltdown and Spectre attacks found impacting CPUs

Multiple new Meltdown and Spectre attacks that impact CPUs built by AMD, ARM and Intel have been discovered. In total, seven new attacks have been discovered, out of which, two are Meltdown variants and the rest are variants of the Spectre attack.

63 New Flaws (Including 0-Days) Windows Users Need to Patch Now

It's Patch Tuesday once again…time for another round of security updates for the Windows operating system and other Microsoft products.

WordPress Flaw Opens Millions of WooCommerce Shops to Takeover

If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store.

Beware the USB device: A weapon for cyberattack

USB drives have been steadily gaining notoriety for delivering cyberattacks, especially through everyday devices in the era of the Internet of Things. The Honeywell report indicates that USB drives could be used as weapons to disrupt organizational operations and services provided by utilities.

New tool developed by Esri and USGS allows users to explore islands worldwide

A new tool that gives users the most detailed view yet of the world’s islands is now available from the USGS and Esri. And it’s as close as your computer or cellphone. The Global Islands Explorer (GIE) is an online app that can help a variety of users, from researchers to policy-makers to the interested public, to locate and access basic information on hundreds of thousands of islands across the globe.

Windows 10 Bug Let UWP Apps Access All Files Without Users' Consent

Microsoft silently patched a bug in its Windows 10 operating system with the October 2018 update (version 1809) that allowed Microsoft Store apps with extensive file system permission to access all files on users' computers without their consent.

New Privilege Escalation Flaw Affects Most Linux Distributions

An Indian security researcher has discovered a highly critical flaw in X.Org Server package that impacts OpenBSD and most Linux distributions, including Debian, Ubuntu, CentOS, Red Hat, and Fedora.

Google Makes 2 Years of Android Security Updates Mandatory for Device Makers

Even after Google timely rolls out security patches for its Android platform, a major part of the Android ecosystem remains exposed to hackers because device manufacturers do not deliver patches regularly and on a timely basis to their customers.

WhatsApp video calls were conduits to potential cyberattacks

A vulnerability in WhatsApp that would have turned answering a video call into an open door for hackers. The good news is that the flaw has not been spotted in use in the wild and a fix has already been issued. Whether or not users actually follow through and update their apps remains to be seen.

Facebook digs deeper into cybersecurity

After the recent Facebook data breach, millions of Facebook users might find themselves in the cross-hairs of identity thieves and phishers.

All Major Web Browsers Will Remove TLS 1.0 and TLS 1.1 Support in 2020

All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon remove support for TLS 1.0 (20-year-old) and TLS 1.1 (12-year-old) communication encryption protocols.

C0c0n XI International Cybersecurity Conference

The annual two-day international cybersecurity conference organised by the Kerala Police, Information Security Research Association and the Society for the Policing of Cyber space (POLCYB) and Knowledge Partner Strava Cyber Labs, literally marked the advent of artificial intelligence and machine learning.

Geo Spatial Technology Solution by Kerala based start-up company Strava Technologies played pivotal role in Kerala Flood Disaster Emergency Rescue Operation, saved many Lives.

We faced first of its kind, "all hell loose" situation in Kerala. Many measures to tackle the situation and to help the humankind is being made, though the Kerala based start-up company in Drone Mapping & Location Intelligence, Strava Technologies (P) Ltd....

5 Ways to Reduce Your Attack Surface

In the simplest terms, the “attack surface” is the sum total of resources exposed to exploit within your enterprise. Defending the attack surface was a lot less complicated when a defined corporate “perimeter” existed, neatly separating a company’s assets from the outside world.

Why Employees are Your Greatest Cyber Risk

A new study has found that nearly two in five workers admitted to clicking on a link or opening an attachment from a sender they did not recognize.

Medical records of 90M patients exposed due to bugs in software

Security vulnerabilities in OpenEMR, one of the world’s most popular open-source medical management software, have left the personal information of more than 90 million patients exposed.

WhatsApp Messages Security Concern

WhatsApp, the Facebook-owned messaging service with 1.5 billion users, that allows scammers to alter the content or change the identity of the sender of a previously delivered message.

Don't Let Your Kids Near Momo Suicide Challenge on WhatsApp

Keep your kids far, far away from this horrific WhatsApp game. Authorities in multiple countries, including the U.S., have issued warnings to parents of a disturbing challenge called Momo, facilitated via WhatsApp.

CCleaner Adds Data Collection Feature With No Way to Opt-Out

Like many others, do you also believe that the popular system-cleaning tool CCleaner was performing well before Avast acquired the software from Piriform last year? If yes, then pop-up advertisements in the previous CCleaner software version was not the last thing you have to deal with.

SamSam Ransomware Attacks Extorted Nearly $6 Million

Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example.

Hackers extend their reach via snail mail

If you think hackers can only get to you online, you’re in for a surprise. Hackers are using all channels available to them, including snail mail. Two recent examples show how cyberattackers are trying to take advantage of the trust of non-electronic communications.

Singapore’s worst-ever data breach affects 1.5M, including PM

Singapore Prime Minister Lee Hsien Loong and 1.5M other citizens have had their personal health data records stolen. This is the largest personal data breach in Singapore’s history – leaps and bounds above the 2016 Uber Inc. data breach that affected 380,000 Singaporean users.

Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users

Security researchers have uncovered a "highly targeted" mobile malware campaign that has been operating since August 2015 and found spying on 13 selected iPhones in India. The attackers, who are also believed to be operating from India, were found abusing mobile device management.

Google Enables 'Site Isolation' Feature By Default For Chrome Desktop Users

Google has by default enabled a security feature called "Site Isolation" in its web browser with the release of Chrome 67 for all desktop users to help them protect against many online threats, including Spectre and Meltdown attack.

Check out use of LIDAR in forestry applications

LIDAR is an active remote sensing technique that measures distances with unprecedented accuracy. Similar to RADAR, it is typically an airborne optical remote-sensing technique, although ground-based and space-borne systems do exist. Shorter wavelengths in the electromagnetic spectrum, typically in the ultraviolet, visible or near-infrared are transmitted at frequencies up to 150 kilohertz (kHz). The return signal is then recorded either as discrete values or in full waveform over multiple returns. This allows mapping of the forest canopy surface, the tree structure, as well as the underlying topography.

Siri is not so trustworthy in the face of phishing

Siri is just trying her best, but she’s not always as helpful as you would like. Now she’s even more of a pain. Apparently, Siri can be easily manipulated by cybercriminals, helping to play into their phishing scams.

Google Solves Update Issue for Android Apps Installed from Unknown Sources

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners.

Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners.

BIM and GIS

If infrastructure project stakeholders want to manage the infrastructure of different classes, they must be able to operate on GIS and BIM as a continuum. It all depends on the type of information they need.

'Zip Slip' Vulnerability Affects Thousands of Projects

Security researchers at British software firm Snyk have revealed details of a critical vulnerability that affects thousands of projects across many ecosystems and can be exploited by attackers to achieve code execution on the target systems.

Facebook defends sharing user data with mobile OEMs

Facebook is defending its privacy and data management practices again after the New York Times on Sunday reported that the social media giant has entered into agreements over the last decade to share user data with at least 60 mobile device manufacturers.

Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives

Researchers have demonstrated how sonic and ultrasonic signals (inaudible to human) can be used to cause physical damage to hard drives just by playing ultrasonic sounds through a target computer's own built-in speaker or by exploiting a speaker near the targeted device.

GIS in transportation

GIS can help in achieving excellence in transportation as well. It significantly aids in planning, monitoring and managing complex systems involved in transportation planning and management more effectively.

One typo can lead you to malware, viruses, and ID theft

Typosquatting, a new practice that takes advantage of people hurriedly entering a URL address and accidentally mistyping, can lead to a host of cybersecurity issues. Just by omitting the “o” in .com, you could end up at a site designed to infect visitors with malware and viruses.

Telegram app serves as communication channel for cybercrime

When a messaging app attracts the likes of Ayatollah Ali Khamenei; the founder of the app is in exile; and countries are trying to ban its use, you know that something’s up. Our researchers investigated the app and discovered how and why Telegram became so popular, and why the dark side became its fan base.

For secure mobility, understand the threats

For CISOs, managing an organization’s network security can be a bit like whack-a-mole. You take care of one issue and another pops up. Overlay a mobile workforce on top of that, and the possibilities for getting hacked can multiply.

Fifth Generation Phishing Kits Have Arrived

Phishing kits are built specifically for those with lower technical knowledge, and as such, provide the cyber-criminal with everything they need in order to carry out an attack. With the barrier now lower, more threat actors can get involved, allowing for more attacks and therefore more potential victims.

More Facebook headaches: Hackers infect at least 40K PCs

A Trojan malware, disguised as a stress-relieving paint tool, infected 40,000 PCs and compromised tens of thousands of Facebook accounts between April 12-16.

Knockoff ad blockers in Chrome could deliver malware

When Andrey Meshkov, the co-founder of AdGuard ad blocker, decided to take a look at some of the more popular knockoffs of his software, he found things that were disconcerting. Extensions were created by design to look like actual well known ad blockers; and with at least one that had 10 million users, compromised privacy was a pretty sure thing.

Google’s 2017 Android Security Report Shines Light on ExpensiveWall

Google recently published its 2017 security report for the Android ecosystem, a comprehensive overview of the constantly evolving mobile threat landscape, which indicates that Trojans, spyware, and hostile downloaders account for a large portion of mobile threats today.

Preinstalled Malware RottenSys Targeting Mobile Users

Check Point mobile threat researchers recently detected a severe infection in 36 Android devices belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users’ use, it arrived with it.

Things to know about Ethical Hacking

Today, Businesses and government-related organizations that are serious about their network security. They hire ethical hackers and penetration testers to help probe and improve their networks, applications, and other computer systems with the ultimate goal of preventing data theft and fraud. You might even consider military service. The military offers many IT opportunities. Military service also looks good to employers that require security clearances. If you want to get into the IT security world as a white hat you must be competent in the following areas: Networking, Programming, Databases.

IoT security (Internet of Things security)

IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). ... To improve security, an IoT device that needs to be directly accessible over the Internet, should be segmented into its own network and have network access restricted.

Healthcare Cybersecurity

The healthcare industry, by definition, revolves around life and death situations. Downtime due to a cyberattack can not only hamper productivity, it can alter lives. As technology has evolved, that danger has escalated critically.

Ransomware demands you play, not pay

A new ransomware attack takes a different tactic when executed, asking the victim to play, rather than pay.