News
-
"DHS S&T’s Transition to Practice program unveils 2017 cohort"Researchers at federally funded laboratories and academic research centers are prepared to introduce new cybersecurity technologies that they have developed to the commercial market. The eight new technologies will be showcased by DHS Science and…
-
"President Trump signs cybersecurity executive order"The highly anticipated executive order addressing cybersecurity has been signed by President Trump. Tom Bossert, Trump’s homeland security adviser, states that the order has been devised to achieve the president’s goal to protect the security of America…
-
"Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms"A study conducted by Bronium, a cybersecurity company, at RSAC 2017 reveal the average percentages of security professionals that have admittedly given into ransomware demands as well as evaded or disabled security protocols put in place by their…
-
"Microsoft’s novel approach to securing IoT"With the rise of IoT bots like Mirai, new approaches must be developed to ensure the continuous renovation and integrity of IoT devices. Microsoft is aiming to change the course of IoT deployments with Project Sopris. Project Sopris hardware is expected…
-
"Researchers unveil new password meter that will change how users make passwords"Researchers from Carnegie Mellon University and the University of Chicago have introduced a new advanced password meter to assist people in creating stronger passwords. Traditional password meters will simply indicate whether a password is weak or strong…
-
"Hackers Are Remotely Controlling Industrial Robots Now"Security researchers have discovered the possibility of hacking industrial robots. Security researchers demonstrated this possibility by hacking the IRB 140 industrial robot arm. This robot could be hacked to disturb the motion of drawing a straight line…
-
"New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack"A new IoT Botnet, Persirai, has been discovered by researchers at Trend Micro. Persirai has targeted 1,000 different models of IP cameras, leaving 120,000 cameras vulnerable to attacks. This article further discusses the details of Persirai, how…
-
"Snake cyberespionage malware is ready to bite Mac users"A Russian cyberespionage group that goes by the names “Snake, Turla or Uroburos” has been actively launching complex cyberespionage attacks since 2007. The main targets of these attacks are government agencies, including intelligence agencies, military…
-
“Privacy Threats Through Ultrasonic Side Channles on Mobile Devices”Researchers at Technische Universitat Braunschweig in Germany have recently shared their research into the discovery of ultrasonic beacons being used to monitor consumer purchasing and television viewing habits to generate targeted advertising.…
-
"Homeland Security Unit Warns Of Malware Campaign Targeting Critical Systems In The Manufacturing, Energy Sectors"The National Cybersecurity and Communications Integration Center has issued an alert to private sector and government agencies about a persistent malware campaign that is targeting critical systems in energy, healthcare, and manufacturing sectors.…
-
"Internet Atlas maps the physical elements of the internet to enhance security"Researchers at University of Wisconsin- Madison have developed a detailed map that outlines the structure of the worldwide internet called the “Internet Atlas”. This map considers physical elements not visible to the average user, but are crucial to the…
-
"Attackers Unleash OAuth Worm via 'Google Docs' App"Security researchers have discovered a new “Google Docs” phishing campaign that attackers have launched to deceive Google users into logging in and granting permission for the application to access their account permissions. This phishing campaign…