-
"'Cyberbiosecurity' and Protecting the Life Sciences"In a paper titled “Trends in Biotechnology”, Jean Peccoud and co-authors aim to spread awareness of cyberbiosecurity as the advancement of biotechnology calls for new methods to secure assets of life sciences. The paper touches upon the…
-
"Nation State Attackers Shut Down Industrial Plant with New ICS Malware"Security researchers at Mandiant have discovered a new malware called Triton, which is capable of deactivating systems put in place to control a variety of industrial processes. Hackers used Triton to compromise Schneider Electric's Triconex Safety…
-
“Individualism May Make You Better at Catching a Phish: Research”A new study conducted by a team of researchers from Australia's Defence Science and Technology Group (DST) and the University of Adelaide suggests that national culture plays a significant role in the discernment of phishing scams. In addition to…
-
Open for Nominations!The 6th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 30, 2018. We look forward to receiving your nominations.
-
“Your Smartphone’s Next Trick? Fighting Cybercrime.”A new way in which cybercrime can be prevented has been discovered by a University at Buffalo-led led team of researchers. Each smartphone device is unique as a result of the obscure variations within each smartphone camera’s sensors, which are created…
-
“Improving Cyber Security in Harsh Environments”Protecting the data of military personnel is critical as the exposure of their information to adversaries could pose serious threats to their safety. The military, along with businesses and individuals are seeking to improve upon the efficiency of…
-
Humans are where Cybersecurity Needs to StartRecent article in the Harvard Business Review talks about how cybersecurity security starts with the employees. There are behavior issues there and they are predictable. This means we can deal with it. It pretty much reinforces the idea that psychology…
-
"Researchers Find Trove of 1.4 Billion Breached Credentials"Security researchers at 4IQ, a dark web analysis firm, have found a database on the dark web that holds a shocking 1.4 billion breached credentials. The database combines credentials deriving from 252 previous breaches. The process of hijacking accounts…
-
"AIG Creates New Model to Score Client Cyber Risk"A new cyber benchmarking model has been developed by American International Group, Inc. (AIG), a top global insurance organization. The new model will be used to asses the cyber risk of clients based on a variety of common attack patterns and widely-used…
-
"Computer Scientists Develop a Simple Tool to Tell If Websites Suffered a Data Breach"A team of researchers at The University of California, San Diego, has developed a tool that could be used to detect whether a website has been compromised by hackers. The tool, called Tripwire, is able to discover if a website has suffered a data breach…
-
“To Fend Off Hackers, Local Governments Get Help from States”Local governments store massive amounts of sensitive information belonging to residents and businesses within their networks, however they often lack the resources to properly assess their cyber defenses or handle cyberattacks. As cyberattacks continue…
-
"Malwarebytes Sees New Mafia Launching Cyber-Attacks"A new report released by security vendor Malwarebytes has identified the “New Mafia” to be behind the significant increase of cyberattacks against businesses in 2017. According to the report, the New Mafia is composed of four different groups of…
News