News
  • "Computer Scientists’ New Tool Fools Hackers Into Sharing Keys for Better Cybersecurity"
    Computer scientists from the University of Texas at Dallas have developed a new approach to combatting hackers. Their method, called DEEP-Dig (DEcEPtion DIGging), lures hackers into a decoy site at which researchers can examine their tactics, tools, and…
  • "Surfing Attack Hacks Siri, Google with Ultrasonic Waves"
    Previous studies have proven that ultrasonic waves can be used to deliver a single command to a cellphone through the air.  New research by researchers at Washington University has expanded the scope of vulnerability that ultrasonic waves pose to…
  • "Sen. Warner Says DoD Must Strengthen Cyber Vulnerability Disclosure Programs"
    In a letter to Dana Deasy, CIO of the Department of Defense (DoD), US Senator Mark Warner (D-VA) brought further attention to the importance of vulnerability disclosure programs. News of the discovery of malware on a DoD-operated web server and how…
  • "Almost Three-Quarters of All Phishing Sites Now Use SSL Protection"
    2019 was one of the most dangerous years on record for online users. Researchers detected 162,144 phishing websites worldwide between October and December 2019, and 266,387 phishing attacks were recorded in July through September 2019. New research…
  • "Budget Request Emphasizes Cyber, Network Security Effort"
    According to the Trump administration's proposed budget for the fiscal year 2021, $18.8 billion will be spent on cybersecurity programs across the federal government. $9 billion is set aside for civilian agencies in support of improving network security…
  • "CISA Outlines Its Role in Helping States With Election Security"
    The Cybersecurity and Infrastructure Security Agency's (CISA) newly released strategic suggests that the agency will take on a facilitator role in the protection of the 2020 elections. CISA's coordination activities will touch on elections infrastructure…
  • "Hackers Can Peep Through This Smart Vacuum’s Camera, Research Shows"
    Researchers at the cybersecurity firm Checkmarx have discovered multiple security vulnerabilities in the internet-connected Trifo Ironpie robot vacuum. One of the most severe vulnerabilities contained by the device could allow attackers to get a view of…
  • "Apple’s iOS Pasteboard Leaks Location Data to Spy Apps"
    To many iOS users, pasteboard is simply part of the way to copy and paste data from one place to another. App developers called Mysk discovered a vulnerability in pasteboard, which can allow malicious apps to exploit it, and allow adversaries to gain…
  • "Lack of Cyber Confidence Across all Levels of Government, Survey Finds"
    SolarWinds recently released a report that highlights the results of a survey to which IT operations and security decisionmakers from federal, state, and local governments responded. According to the report, all levels of government lack organizational…
  • "Healthcare Providers Overconfident in Data Sharing Controls, Security"
    A survey conducted by Netwrix to which 1,045 global IT professionals from different sectors, including healthcare, responded. The purpose of the survey was to gain insight into how organizations handle data and to identify security shortfalls that could…
  • "By Exploiting an LTE Vulnerability, Attackers Can Impersonate Mobile Phone Users"
    Researchers at Ruhr Universitat Bochum found a vulnerability in the mobile communication standard LTE that could be exploited by attackers to impersonate mobile phone users. The abuse of this vulnerability could allow attackers to book services paid via…
  • "Tiny, Battery-Free ID Chip Can Help Combat Losses to Counterfeiting"
    According to a report from the Organization for Economic Co-operation and Development, the estimated value of counterfeit goods sold worldwide will reach $2 trillion in 2020. The counterfeiting of goods impacts the consumers and companies that build…