News
  • "Most damaging threat vector for companies? Malicious insiders"
    A new survey conducted by SANS reveals that organizations are increasingly recognizing malicious insiders as the greatest threat to their systems. There are several factors that can lead to the performance of insider threat activities such as…
  • "Senators introduce bill to secure Internet of Things devices"
    A new bill that aims to address issues pertaining to the security of IoT devices has been introduced by a bipartisan group of U.S. senators. Recent attacks on IoT devices have ignited concerns about the lack of security that has been implemented for such…
  • "Researchers pwn Alexa, turning Amazon Echo into covert snooping device"
    A vulnerability within the popular Amazon Echo device has been discovered by researchers at MWR InfoSecurity that could be exploited to enable attackers to secretly eavesdrop on users and steal sensitive data. Researchers reveal that this vulnerability…
  • "EU's GDPR: What Will American Companies Have To Do To Comply?"
    Starting in the Spring of 2018, the European Union’s General Data Protection Regulation (GDPR) will be in effect. The objective of the GDPR is to strengthen the protection of data belonging to citizens within the EU. However, this regulation will have an…
  • "Applied cybersecurity research for better protection of critical national infrastructure sectors"
    Cyber Apex Solutions, LLC, has been awarded a five-year Other Transaction Agreement (OTA) with a maximum value of $70 million by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to aid applied research of prototype…
  • "Hackers accidentally create network-busting malware"
    Arbor Networks has presented new details of the latest variant of the Mirai botnet, which has been designed to exploit IoT devices in one network to launch attacks on another. It has been revealed by researchers that this variant could knock networks…
  • "Creating a Common Language Of Cybersecurity"
    In support of creating a common language for the management and reporting of cyber threats to government organizations and industries, the Office of the Director of National Intelligence is developing standard definitions to improve the communcation and…
  • "The National Crime Agency is sending hackers to rehab"
    The National Crime Agency has developed a cyber-rehabilitation program for young hackers in hopes of encouraging the use of such skills for good. The first two-day camp of the “Prevent” program was held in July with all attendees being perpetrators of…
  • "Homograph attacks: Don’t believe everything you see"
    ESET security researchers have brought attention to homograph attacks, which could potentially pose significant threats to users as it advances the act of spoofing. Fraudulent websites can be designed to appear secure as attackers could convert the…
  • "House Panel Passes Bills to Reorganize DHS Cyber Team and Collect Zero-Day Info"
    The U.S. House Committee on Homeland Security passed two bills that aim to restructure the Department of Homeland Security’s (DHS) cybersecurity operations and establish a report on practices performed by the government in the process of…
  • "How one small hack turned a secure ATM into a cash-spitting monster"
    IOActive researchers have demonstrated the possibility of a hacker infiltrating an ATM machine to exploit a vulnerability, which could allow all of the money within the machine to be dispensed until complete depletion. This demonstration highlights the…
  • "Industroyer malware a turning point for ICS security"
    Security researchers have shared further analyses of the “Industroyer” malware that targeted Ukraine’s power grid in December 2016.  Researchers from ESET and Dragos, Inc., have shared their research in a presentation at Black Hat, in which they…