Back to Top

Computer Security News

We are an independent cybersecurity news site. Visit RootExplorer regularly to stay up to date and learn how to protect personal and business data.

artificial intelligenceCybersecurity AI Ready for Prime Time

AI-based cybersecurity solutions can help people fight online attacks in an efficient manner. Any malware prevention solution is as good as the data that powers it, though, so making use of advanced algorithms which can identify malware patterns is essential.

Read more..

reviewsMalicious Apps Post Positive Reviews

According to SC Media, a number of 30 malicious apps, which have been downloaded hundreds of millions of times, have the capability of downloading further malware which allows them to post fake information to the Play Store, with the goal of making them more desirable.

Read more..

financesCyber Attacks May Cause Financial Crisis

Christine Lagarde, the head of the ECB, has recently stated that a cyberattack which would target several important banks could lead to financial instability. According to a report by the ESRB, the global cost of cyber attacks could exceed $600bn this year.

Read more..

infrastructureCyberattacks on Critical Infrastructure

Geopolitical tensions have increased the number of attacks targeting critical national infrastructure. Unfortunately, the healthcare industry is a very attractive target for most hackers. To be efficient, cybersecurity needs to be a significant part of the company's culture.

Read more..

internet of thingsIoT Honeypot Detects Zero-Day Exploits

A small group of researches have created a virtual honeypot framework, which can help IoT manufacturers detect zero-day exploits that could make their devices vulnerable to cyberattacks. The framework can emulate various IoT devices by loading their firmware images.

Read more..

processesThe Biggest Cybersecurity Threats

Is API security just a rebrand of an already existing problem? The key issue is that we are still trusting client-supplied input. Policy exceptions are often used by cyber criminals, who are able to bypass multifactor authorization by making use of legacy protocols.

Read more..

malware campaignLemon Duck Malware Campaign Targets IoT

A malware campaign targets manufacturers which continue to use computers that run Windows 7. Cyber villains have used the Lemon Duck malware, which can infect a great variety of IoT devices, turning them into crypto-mining bots that make cybercriminals richer.

Read more..

smart lightFlaw in Philips' Smart Light Bulbs

Check Point has revealed a vulnerability which affects Philips' Hue Smart Light Bulbs and can be exploited over-the-air to connect to the owner's Wi-Fi network, and then install ransomware and spyware. Fortunately, Philips has already patched the device.

Read more..

touch panelsTouch Panels Vulnerable to Remote Attacks

According to US Department of Homeland Security, software management platform C-More Touch Panels is affected by a vulnerability which gives threat actors access to confidential information. Unprotected project files allow the attackers to access the system remotely.

Read more..

patchesOrganizations Fail to Apply Patches

A team of researchers at Recorded Future have released a list with commonly exploited flaws. The top 10 threats include Adobe Flash Player, Microsoft Internet Explorer, Microsoft Office and WinRAR. To stay safe, organizations must keep all their software up to date.

Read more..