News
-
"Check Point Discovers Media Subtitle Vulnerability Impacting Millions"According to Check Point security researchers, attackers can exploit vulnerabilities within media player subtitles to perform malicious activity, which could pose serious threats to the security of millions of users. Media players that have been …
-
“SCADA systems plagued by insecure development and slow patching”In a new report released by Trend Micro, researchers share details of their examination and discovery of vulnerabilities affecting Human Machine Interfaces of SCADA systems. As various segments of the critical infrastructure rely on SCADA systems to…
-
“Is the world ready for GDPR? Privacy and cybersecurity impacts are far-reaching”The General Data Protection Regulation (GDPR) will go into effect on May 25, 2018. The GDPR consists of rules enforced by the European Commission to govern the privacy and security of personal data. Though this regulation is being put forward by the…
-
"DHS wargames included a scenario similar to WannaCry"Before the launch of WannaCry malware, the Department of Homeland Security conducted a national drill to observe the reactions of the government and the private sector in the case of a multi-sector cyberattack targeting critical infrastructure. It has…
-
"Network traffic provides early indication of malware infection"Researchers reveal the capability of detecting malware infection far in advance with the examination of malware-related network traffic carried by an ISP preceding the actual detection of malware. In the study of this new malware-independent…
-
2017 ISEF Winners of NSA RD AwardsAnd the National Security Agency Research Directorate Awards Winners are:
-
"Fujitsu high-speed technology identifies within minutes damage from cyberattacks"Fujitsu has announced a high-speed forensic technology that they have developed to identify the degree to which an organization's intranet has been damaged after a targeted cyberattack. Fujitsu's new technology shortens the average time required to…
-
"Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys"An 11 year old boy named Reuben Paul performed a demonstration at a cybersecurity conference, showing the weaponisation of interconnected smart toys through the infiltration of Bluetooth devices, which left the audience astonished. This article discusses…
-
"Unraveling mobile banking malware, Check Point"Check Point researchers have conducted an investigation to decipher the operation behind banking malware. It has been discovered that the development and operation of banking malware requires little skill with the availability of simplified tools and…
-
"What's next for NIST cybersecurity framework?"Officials at an NIST event emphasize the importance for constant maintenance of cyber procedures as the evolution of attacks continue. It is essential for companies to perform continuous maintenance so that in the case of an attack, operations aren’…
-
"Oddities in WannaCry ransomware puzzle cybersecurity researchers"The massive spread of the WannaCry ransomware to more than 100 countries within a few hours have left cybersecurity researchers baffled as to how this attack was initiated, the rapid speed of which it spread as well as how the hackers behind this attack…
-
"Keylogger Found in Audio Driver of HP Laptops"Researchers at Modzero, a Swiss cybersecurity firm, have revealed their discovery of a keylogger hidden within audio drivers of HP laptops. This feature found in the audio driver is identified as a keylogger as it records and saves all of a user’s…