Category: Cybersecurity News

Over 3,000 iOS and Android Apps Leak 100 Million User Sensitive Records via Misconfigured Firebase Backends
When building an app that needs to store and share data from a server, software developers can rely on Google's Firebase Realtime cloud-hosted database. This Infrastructure as a Service (IaaS) removes serious time constraints by providing app developers with maintenance and support, offline support, and real-time synchronization of data with clients in real-time. And, since ...

KRACK Attacks: Key Reinstallation AttaCKs that Break WPA2
This is something I covered last year, but I wanted to go more in-depth in this topic now that there is more information on it. Our Wi-Fi wireless networks are currently protected by a security encryption protocol called "Wi-Fi Protected Access 2 (WPA2)." In the previous decades before, our wireless networks depended on a legacy ...

Your Home Router Could Be Infected – The Destructive VPNFilter Malware Is Worse Than We Thought
According to new research by Cisco Talos and its additional intelligence groups, the VPNFilter malware that was discovered in the previous months is much worse than originally thought. New modules in stage 3 were discovered. Also, the list of known affected devices has expanded, effectively increasing VPNFilter's attack surface. In the days Cisco's first findings ...

This Month in Cybersecurity News [June 2018]
I've been neglectful on posting cybersecurity news lately. To make up for it, here are some of the hot cybersecurity events that occurred this month. The New OnePlus 6 Smartphone - Serious Bootloader Vulnerability The Chinese smartphone manufacturer, OnePlus, just released the all new OnePlus 6 smartphone last month. With its high-end specifications, glass-design, large ...

Twitter Urges Its Users to Change Their Password Immediately
Thursday afternoon, Twitter discovered a bug in its systems that revealed plaintext passwords. Passwords are usually stored as a "message digest," which is the result of a one-way cryptographic hash function, such as SHA-256. This prevents unauthorized parties from seeing the actual password. The bug was discovered when Twitter detected an internal log displaying the ...