Cybersecurity

Novel Ahoi attacks could compromise confidential VMs

Confidential virtual machines could be breached through two different types of novel Ahoi attacks, reports SecurityWeek. Intrusions leveraging the first technique, dubbed “Heckler,” involved the targeting of hardware-based trusted execution environments running on Intel’s Trust Domain Extensions and AMD’s Secure Encrypted Virtualization-Secure Nested Paging technologies with malicious hypervisors that sought to facilitate authentication evasion and […]

Cybersecurity

NTMC database exposed personal info to open web: report

The National Telecommunication Monitoring Centre (NTMC) in Bangladesh has exposed a database to the open web. The types of data that leaked online were extensive, American technology magazine WIRED reports. The list of data is long: names, professions, blood groups, parents’ names, phone numbers, the length of calls, vehicle registrations, passport details and fingerprint photos, […]

Cybersecurity

The 9 most common types of malware (and some of the worst malware attacks in history)

There are many different types of malware in existence and unfortunately the number is increasing year-on-year. According to a report by software company Symantec there were almost 670 million malware variants in 2017, with researchers estimating this has risen to more than 1 billion malware programs today.  While the presence of so many malware variants […]