News
  • “Four Methods Hackers Use to Steal Data from Air-Gapped Computers”
    Security researchers have demonstrated ways in which data could be extracted from air-gapped computer systems through the development of covert channels. These channels are characterized into 4 different types, which include electromagnetic, acoustic,…
  • "Chemist Proposes 'Sweaty Analysis' to Better Secure Electronics"
    Jan Halámek, an assistant chemistry professor at the University at Albany, has released a new concept paper in which he focuses on cybersecurity and the use of sweat analysis as a new method of biometric authentication. The proposed approach for…
  • "Bugcrowd: Young Cybersecurity Professionals Are Turning to Bug Hunting"
    An annual report released by Bugcrowd titled, “Inside the Mind of a Hacker 2.0”, shares findings in relation to the bug hunting community. The report reveals that there has been a considerable increase of participants in bug bounty programs from 2016.…
  • "Hacking Blockchain with Smart Contracts to Control a Botnet"
    Security researcher, Majid Malaika, has warned of the possible abuse of Blockchain technology to enable the creation of a powerful new form of botnet. The attack method that has been named “Botract”, abuses code that runs on a blockchain known as a smart…
  • "What Makes Hackers Tick?"
    Researchers at Sandia National Laboratories will conduct a study funded by the U.S. Department of Defense, in which the physical and mental responses of hackers are measured as they perform attacks. In the study, hackers will wear body…
  • "Cyber Discovery Program Aims to Encourage More Teens into Industry"
    In an attempt to address the skills gap within the cybersecurity field, the U.K. government has launched the Cyber Discovery program. This program has been delivered by SANS Institute, BT, FutureLearn, and Cyber Security Challenge U.K. to find teenagers…
  • "Companies Turn to War Games to Spot Scarce Cybersecurity Talent"
    An annual U.K. cybersecurity competition aims to help address the severe workforce shortage within the cybersecurity job market by raising awareness and encouraging the pursuance of careers in the cybersecurity field. The Cyber Security Challenge U.K.,…
  • "Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says"
    A demonstration performed by Robert Hickey, an aviation program manager within the Cyber Security Division of the DHS S&T Directorate and his team of experts, reveals the possibility of remotely hacking a commercial aircraft. The aircraft used in the…
  • "6 Steps for Sharing Threat Intelligence"
    Industry experts have emphasized six essential steps that organizations should take in order to improve upon the sharing of threat intelligence. Organizations must understand their event data before sharing, optimize the use of event data…
  • “Transparency of Machine-Learning Algorithms Is a Double-Edged Sword”
    Starting on May 25, 2018, the European Union's General Data Protection Regulation (GDPR) will be in full force. The set of rules to be enforced by the GDPR seek to protect the privacy of data, while giving EU residents a significant amount of control…
  • “Phishing Biggest Threat to Google Account Security”
    Phishing remains one of the most prominent and successful attacks, targeting users in a variety of ways designed to gain access to their online credentials such as login information, credit card data and more. Researchers at both University of California…
  • "New University Research Warning over Voice Recognition Biometric Security"
    A study conducted by researchers at the University of Eastern Finland reveals the inadequacy of voice recognition systems. According to researchers, voice recognition systems could be tricked by cyber criminals with the use of a number of different…