-
“CyberX Security Researchers Demonstrate How to Jump the ICS/SCADA Air Gap at Black Hat Europe 2017”Security researchers at CyberX, a leading ICS security vendor, will demonstrate an attack in which Programmable Logic Controllers (PLCs) are targeted in order to jump the industrial control system (ICS) air gap and exfiltrate confidential information.…
-
"Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches"According to Saurabh Harit, researcher at Spirent SecurityLabs, vulnerabilities within devices such as the IV infusion pump and the digital smart pen could lead to an extensive data breach upon exploitation by hackers. Research conducted on the security…
-
-
"Game Theory Harnessed for Cybersecurity of Large-Scale Nets"Research being led by Purdue University in collaboration with Sandia National Laboratories aims to improve upon the cybersecurity of large-scale systems such as power grids, autonomous military defense networks, industrial control systems, consumer…
-
"HADES Misleads Hackers by Creating an Alternate Reality"Cyber researchers at Sandia National Laboratories are applying deceptive strategies in defending systems from hackers through the use of a recently patented alternative reality by the name of HADES (High-fidelity Adaptive Deception & Emulation System…
-
"75% of Insider Breaches Are Accidental"According to the Q3 GTIC Quarterly Threat Intelligence Report released by NTT Security, a majority of insider threats stem from accidental or negligent activities. Organizations can be at significant risk due to insider threats without being aware. This…
-
"Report Finds Millions of Insecure Devices in European Cities"According to a report released by Trend Micro, millions of smart-home gadgets within European cities have been discovered by researchers to be highly vulnerable to cyberattacks. Cities such as Berlin and London are highlighted as they contain the…
-
"Traveling This Holiday Season? Beware of RFID Attacks"Radio-frequency identification (RFID) is a technology that is commonly exploited by malicious criminals as it used for payment and access control in consumer and business operations. Malicious actors seek to capitalize on RFID attacks by accessing …
-
“Google AI Lets Phone Owners Know About Shoulder Surfers”Google researchers, Hee Jung Ryu and Florian Schroff, have demonstrated the use of a machine-learning and facial recognition system that they have developed to detect shoulder surfers. This system by the name of “Electronic Screen Protector with…
-
“New Nanoscale Security Method May Be The Best Hacking Prevention”Researchers at the New York University Tandon School of Engineering have introduced a new method that could be used to inexpensively provide maximum security against hacking. This method uses a new class of Cryptographic primitives made of…
-
-
"Uber Admits It Hid Massive Data Breach of 57M Users and Drivers"Uber has recently admitted that it faced a massive data breach in late 2016, which exposed personally identifiable information belonging to 56 million users and 600,000 drivers. Information exposed by this breach includes names, email addresses, phone…
News