News
  • "Passwords Still Dominant Authentication Method, Top Cause of Data Breaches"
    Most applications, business devices, and data use only usernames and passwords for authentication.  Passwords are still the top attack vector for organizations.  Researchers from EMA surveyed 200 IT and security managers and discovered that 42…
  • "Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys"
    Researchers from KU Leuven in Belgium and the University of Birmingham in the UK recently revealed new vulnerabilities that they discovered in the encryption systems used by car engine immobilizers, the radio-enabled devices that allow the ignition to be…
  • "FBI Working to 'Burn Down' Cyber Criminals’ Infrastructure"
    According to the FBI Director, Christopher Wray, work is being done to take down the infrastructure and tools used by cybercriminals to execute increasingly dangerous attacks. The FBI is targeting the Dark Web as it has provided a platform for…
  • "Ransomware Attack on Sheep Farmers Reinforces Need for Diverse Cyber Defenses"
    The IT company, Talman Software, faced a ransomware attack that severely affected wool sales as the firm processes more than 75 percent of wool sales in Australia and New Zealand. This incident further highlights how cyberattacks can impact the economy…
  • "'Internet of Things' Could Be an Unseen Threat to Elections"
    Laura DeNardis, Professor of Communication Studies at the American University of Communication wrote a book, titled "The Internet in Everything: Freedom and Security in a World with No Off Switch," in which she discussed how unsecured Internet of Things…
  • "Researchers Discover That Intel Chips Have an Unfixable Security Flaw"
    Security researchers at Positive Technologies have discovered a flaw in Intel chips that is very difficult to exploit and is completely unpatchable. The vulnerability is within Intel's Converged Security and Management Engine (CSME). CSME is a part of…
  • "IT Startup Develops Novel Blockchain-Based Approach for Secure Linking of Databases"
    Researchers at Saarland University developed software, called "ChainifyDB," that uses a blockchain-based approach to allow different companies to connect their database management systems and securely process the data records needed for collaboration.…
  • "Researchers Identify Novel Cybersecurity Approach to Protect Army Systems"
    Researchers at the U.S. Army's corporate laboratory collaborated with the University of California, Riverside, to develop a new approach called "SymTCP." The novel approach aims to protect Army systems against intrusion by adversaries and the evasion of…
  • "Warning As Dangerous Coronavirus Malware Is Sent To Millions: Here’s What You Need To Do"
    The fear and confusion surrounding the coronavirus outbreak have prompted threat actors to develop coronavirus-themed malware campaigns that target millions of people. One highly-distributed email contains an attachment claiming to have important…
  • "Fake Alerts About Outdated Security Certificates Lead to Malware"
    Researchers at Kaspersky Lab have discovered that cybercriminals are using fake alerts about outdated security certificates, complete with an "Install (Recommended)" button to download malware onto a person's computer. The fake notification is delivered…
  • "New PwndLocker Ransomware Targeting U.S. Cities, Enterprises"
    U.S. cities and organizations are being targeted by a new strain of ransomware, dubbed "PwndLocker," which demands ransom amounts from $175,000 to more than $660,000 based on the size of the targeted network. Lasalle County in Illinois was demanded to…
  • "Microsoft OneNote Used To Sidestep Phishing Detection"
    Researchers have discovered a new phishing campaign, where the adversaries used OneNote to distribute the Agent Tesla keylogger. OneNote is Microsoft's digital notebook that automatically saves and syncs notes. Using OneNote to distribute the malware…