Are millennials keeping their data safe?

[section_tc][column_tc span=’12’][h_tc type=’2′] Norton reports one in three millennials use the same password for all accounts; 53 percent have shared passwords with friends or family. By DECCAN CHRONICLE [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] While the awareness level in millennials is high about the latest trends in technology and gadgets, it is alarming to see how the knowledge is not being translated well into practice, making them an easy prey for…

Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers

[section_tc][column_tc span=’12’][h_tc type=’2′] • We assess with high confidence that the Winnti umbrella is associated with the Chinese state intelligence apparatus, with at least some elements located in the Xicheng District of Beijing. • A number of Chinese state intelligence operations from 2009 to 2018 that were previously unconnected publicly are in fact linked to the Winnti umbrella. • We assess with high confidence that multiple publicly reported threat actors…

Eavesdropping over Visible Light, research confirms that is possible and the attack is less limited

[section_tc][column_tc span=’12’][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] Visible light communication (VLC) is one of the newest technologies that has been developed for short and middle range data communication,[nbsp_tc]as a commercial solution is predicted to have a considerable market penetration in the near future due to the advantages the technology brings. VLC provides a flexible communication channel that, according to the standard [2], allows data transfer rates ranging from 11.67 kb/s to…

New LTE attacks open users to eavesdropping, fake messages, location spoofing

[section_tc][column_tc span=’12’][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit design flaws in the communications protocol and unsafe practices employed by the stakeholders and can be used to achieve things like impersonating existing users, spoofing the location of the victim device, delivering fake emergency and warning messages, eavesdropping…

Copyright © 2019 Shapestones Ltd. All Rights Reserved