News
  • "Isolated, Air-Gapped Cypto-Wallets Hacked"
    Researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev demonstrated a way in which private keys could be siphoned from air-gapped cold wallets, which are offline cryptocurrency wallets used to store bitcoin. The demonstration performed by…
  • "'Gold Galleon' Hackers Target Shipping Industry"
    The group responsible for the launch of several extensive BEC attacks on the shipping industry has been identified by researchers from Dell SecureWorks Counter Threat Unit. The group called Gold Galleon, exploited the industry's inadequate security in…
  • "Researchers Propose Scheme to Secure Brain Implants"
    A method has been proposed by researchers from KU Leuven, Belgium, that would strengthen the security of implantable neurostimulators. According to researchers, the communications between the neurostimulator and its external device programmer lacks…
  • Cyber Scene #20 - Facebook Faceoff
    Cyber Scene #20 Facebook Faceoff
  • "The Public Has a Vital Role to Play in Preventing Future Cyber Attacks"
    An extensive hacking incident recently occured in which a signifiant number of Australian organizations were affected. The attack highlights the importance of taking on stronger approaches to defending against cyberattacks and educating the…
  • "First Public Demo of Data Breach via IoT Hack Comes to RSAC"
    A demonstration performed by security researchers at the 2018 RSA Conference shows a way in which novice attackers could compromise an IoT device and steal personally identifiable information. The demonstrated attack could be performed without…
  • “Trustjacking exploit abuses iTunes feature to spy on iOS devices”
    Symantec researchers at RSA 2018 have disclosed a technique dubbed “Trustjacking”. The technique allows attacker to spy on and gain control of devices via the Wi-fi sync feature in iTunes. This article further discusses Trustjacking, Apple’s response to…
  • “Google’s Project Zero Exposes Unpatched Windows 10 Lockdown Bypass”
    Researchers at Google’s Project Zero have released information and proof-of-concept for a bypass that affects Windows 10 S and 10 users with user mode code integrity enabled. Microsoft and Google are currently working toward finding a solution. This…
  • “DHS Prepares Cross-Sector Strategy to Limit Domino Effects from Big Cyberattacks”
    A new cyber strategy will be released by the Department of Homeland Security, which aims to alleviate the domino effects of cyberattacks on critical infrastructure sectors and government agencies. The strategy will also help to improve the security…
  • “70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks”
    Tripwire conducted a survey to which 151 IT and operational technology (OT) security professionals at energy, oil, and gas companies responded. An overwhelming majority of respondents expressed concerns surrounding the shutdown of operations and…
  • “This Ransomware Was Rewritten to Mine Cryptocurrency - and Destroy Your Files”
    Researchers at Trend Micro have discovered cryptocurrency-mining malware that appears to be rewritten from a form of ransomware called XiaoBa. In addition to performing unauthorized cryptocurrency mining, the malware also ruins users’ applications and…
  • "Intel Unveils New Threat Detection Technology"
    Intel recently announced the launch of two new technologies, Threat Detection Technology and Security Essentials. The Threat Detection Technology will improve upon the efficiency of scanning for cyberthreats, while Security Essentials will…