Researchers discovered the Syslogk Linux rootkit delivers a backdoor trojan hides on a targeted machine until triggered.
ZDNet From ACM TechNews | June 21, 2022
A study of 164 government-endorsed education technology products found 146 endangered children's privacy by collecting and selling their data to ad tech companies...ZDNet From ACM TechNews | June 1, 2022
Researchers found that a bug in Zyxel firewalls that could enable unauthenticated remote attackers to execute code.
ZDNet From ACM TechNews | May 24, 2022
Researchers at cybersecurity software company SentinelOne reported two high-severity bugs in Avast and AVG antivirus products that have gone undetected for a decade...ZDNet From ACM TechNews | May 9, 2022
A programmer behind the popular open-source npm program node-ipc poisoned it with malware that erased the hard drives of computers located in Russia or Belarus....ZDNet From ACM News | March 28, 2022
The 2022 State of Healthcare IoT Device Security Report estimates 53% of medical devices in hospitals connected to the Internet of Things have critical flaws.
ZDNet From ACM TechNews | January 21, 2022
There's been growth in cheap, easy-to-use malware available to hackers who want to steal cryptocurrency from users.
ZDNet From ACM News | January 21, 2022
National University of Singapore engineers have constructed a robotic hand that can grasp various objects using three-dimensionally-printed fingers.
ZDNet From ACM TechNews | January 5, 2022
ControlFlag can automatically detect anomalies in software code - and it could spare developers hours of tedious work.
ZDNet From ACM News | October 25, 2021
Singapore and Finland have agreed to recognize each other's cybersecurity labels for Internet of Things devices.
ZDNet From ACM TechNews | October 8, 2021
Google is investing $1 million in the Linux Foundation's Secure Open Source pilot program to make open source projects more secure.
ZDNet From ACM TechNews | October 6, 2021
Amazon Web Services' Mario Berta combined the capabilities of two quantum computers in order to generate truly random numbers to strengthen cryptographic keys. ...ZDNet From ACM TechNews | September 10, 2021
Hackers and malware developers are now targeting victims' Internet connections to produce illicit income clandestinely via proxyware infections, according to researchers...ZDNet From ACM TechNews | September 7, 2021
Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers, centered on the...ZDNet From ACM TechNews | August 12, 2021
Microsoft security researchers are warning customers about the LemonDuck crypto-mining malware that attacks Windows and Linux systems.
ZDNet From ACM TechNews | August 5, 2021
Researchers at Check Point Research said the Windows-based malware variant known as Formbook has been upgraded to infiltrate Mac computers.
ZDNet From ACM TechNews | August 3, 2021
Microsoft offers a workaround to a bug that could give attackers the ability to copy an organization's password hashes for offline cracking.
ZDNet From ACM News | July 23, 2021