News
  • "AMD Says Patches on the Way for Flawed Chips"
    According to chip manufacturer, AMD, the critical security vulnerabilities recently revealed by CTS Labs to be contained by some AMD chips will soon be fixed with firmware patches and a BIOS update. AMD assures that the security flaws will be fixed…
  • "Hack the State Department Bill Introduced"
    The Hack Your State Department Act has been introduced by U.S. congressmen, Ted Lieu, D-Calif., and Ted Yoho, R-Fla. The proposed bill aims to develop a bug bounty program in which ethical hackers would be invited to identify and disclose security…
  • “A ‘Tamper-Proof’ Currency Wallet Just Got Backdoored by a 15-Year-Old”
    Salem Rashid, a 15-year-old programmer from the UK, demonstrated the possibility of obtaining private keys from the popular Ledger hardware wallet, which is used to store cryptocurrencies. Vulnerabilities contained by the Ledger Nano S…
  • "Tricks That Cybercriminals Use to Hide in Your Phone"
    Cybercriminals are developing new ways in which they distribute malicious apps as well as conceal the code and activities associated with such apps. Social engineering or technical mechanisms could be used to strengthen the performance of malicious…
  • "F-Secure Looks to Address Cyber Security Risks in Aviation Industry"
    As the technology used within the aviation industry becomes increasingly connected to the internet, cyber risks rise. In order to improve upon the security of aircraft, infrastructure, data, and reputation within the aviation industry, F-Secure is…
  • "United States Department of Energy to host multi-laboratory Cyber Defense Competition"
    The U.S. Department of Energy’s (DOE) Office of Electricity Delivery and Energy Reliability’s (OE) Infrastructure Security and Energy Restoration Division will be hosting a cyber defense competition in which college students from across the U.S.…
  • "Cyber-Crooks Find a New Way to Share Malware and Scams"
    BlackTDS is a service that allows unskilled cybercriminals to launch extensive malware campaigns. According to researchers at Proofpoint, the service has been advertised on the dark web markets since December of 2017.  This article continues to…
  • "DHS S&T Release New Cybersecurity Research Portfolio and Technology Guides"
    Two new guides called the 2018 Cyber Security Division Portfolio Guide and the 2018 Cyber Security Division Technology Guide have been released by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T). The guides aim to…
  • "New Study Presents Method to Stop Cyber Attacks on GPS-Enabled Devices"
    A new computer algorithm that could be used to mitigate the impact of GPS spoofing attacks faced by electrical power grids and other GPS-enabled devices has been described in a recent study conducted by researchers from the UTSA Department of…
  • "GandCrab Ransomware Crooks Take Agile Development Approach"
    Cybercriminals behind the launch of GandCrab ransomware, which has infected more than 50,000 victims have adopted an agile development approach for the evolution of this malware. An assessment conducted by Check Point of the different versions of…
  • "Cryptojacking Threat Continues to Rise"
    The threat of cryptojacking, also known as the unauthorized mining of cryptocurrency, continues to grow. According to Secureworks, the value of the cryptocurrency market has grown significantly in conjunction with the rise of crypto-mining malware in…
  • "Air Gapping PCs Won't Stop Data Sharing Thanks to Sneaky Speakers"
    A study conducted by researchers at Ben-Gurion University of the Negev reveals that sound output devices such as computer speakers, headphones, earbuds, and more could be used to extract and send data between air-gapped computers. The new method called…