ZecOps discovers working remote exploit against fully patched Apple iOS devices

A computer bug, discovered by San Francisco-based ZecOps, a mobile security forensics company while it was investigating a sophisticated cyberattack against a client that took place in late 2019, has left 500M iphone and iPad users vulnerable to cyberattacks. Zuk Avraham, ZecOps’ CEO said, he found evidence that the vulnerability has been exploited in at…

Chinese hackers stole missile plans from U.S. Navy contractors

According to the U.S. National Security Agency, Chinese cyber activity in the United States has risen in recent months with the bulk of these attacks aimed at disrupting critical infrastructure. The Wall Street Journal has reported, Chinese hackers have been able to breach and steal a slew of documents,including missile plans, from U.S. Navy contractors…

Chinese cyber activity on the rise in the U.S.: NSA official

Yesterday, senior officials from the Department of Homeland Security and the Justice Department at a Senate Judiciary Committee hearing on “China’s Non-Traditional Espionage Against the United States: The Threat and Potential Policy Responses.” As per a senior U.S. intelligence official, in recent months, cyber activities by China in the United States has increased significantly. These…

Key stakeholders to attend meeting on quantum computing at White House

Given its wide ranging potential, Washington wants to develop and leverage the power of quantum computing which is currently in its infancy. On Monday, in efforts aimed at boosting efforts at quantum computing, the White House is set to hold a meeting with academic experts, U.S. government officials, and leading tech companies including Alphabet Inc,…

Chinese hackers scanned for strategic economic opportunities in Alaska

Computers belonging to the state government of Alaska, including the local ISP, the governor’s office, the Alaska Department of Natural Resources, etc were extensively scanned by hackers from China’s Tsinghua University, reads a report by cyber security firm Recorded Future. As per a cyber security research firm Recorded Future, hackers operating from an elite Chinese…

Trump Administration expected to unveil new cyber rules on vulnerabilities today

The new rules aim to balance the requirements of having a basket of vulnerabilities to conduct cyber attacks against enemy systems with that of protecting domestic industry and consumers from cyber attacks from foreign intelligence agencies, criminals and hackers. As per a national security official, speaking on the condition of anonymity, on Wednesday the Trump…

Microsoft’s highly internal secret database of bugs had been hacked in 2013

Microsoft’s internal database contains description of vulnerabilities of its widely used products, including its Windows operating system. This treasure trove of critical information, guarded by just a password, was accessed by hackers in 2013. According to 5 former employees of Microsoft, a highly sophisticated group of hackers had managed to break into Microsoft’s network security…

Major U.S. tech companies press Congress for increased transparency in internet surveillance programs

A bipartisan group is in the process of drafting legislation which is expected to address some, if not all, of the concerns raised in the said letter. More than two dozen U.S. tech companies in the U.S., including Amazon and Facebook has urged the U.S. Congress to make broad changes to laws that govern internet…