News
  • "Flaws in Metrics for User Login Systems"
    A study conducted at Rutgers University-New Brunswick brings further attention to flaws in the metrics used to measure the performance of user login systems. In addition to highlighting these flaws, the study proposes a solution towards measuring the…
  • "Unhackable? New chip makes the computer an unsolvable puzzle"
    A new computer processor architecture called MORPHEUS could usher in a future where computers proactively defend against threats.  It would be able to render the current electronic security model of bugs and patches obsolete.  …
  • "Industry Warns of Flaws as Gov’t Proposes Mandatory IoT Security Labelling"
    The UK government is considering establishing an IoT security labelling scheme, which will help inform consumers about how secure IoT products are. The consultation suggests three security requirements laid out by the UK government's "Secure by Design"…
  • "50,000 Companies Exposed to Hacks of 'Business Critical' SAP Systems: Researchers"
    New ways of exploiting vulnerabilities in SAP software have been discovered by security researchers. These vulnerabilities leave the 50,000 companies that use this software susceptible to being hacked. The exploitation of these vulnerabilities could…
  • Executive Order on America’s Cybersecurity Workforce
    The White House released an Executive Order on America's Cybersecurity Workforce. It call this workforce a national asset. It calls for the government to enhance mobility of the workforce to move between public and private employment. It call for…
  • "Majority of Encrypted Email Clients Vulnerable to Signature Spoofing"
    Researchers from the Ruhr University Bochum and Munster University of Applied Sciences examined the implementation of two major email encryption standards, OpenPGP and S/MIME. According to the findings of this analysis, the majority of leading encrypted…
  • "GAO Flags New Cybersecurity Issues for Upcoming Census"
    The Government Accountability Office (GAO) urges the Census Bureau to improve upon its cybersecurity. The public will be allowed to respond to the 2020 Decennial Census via the internet. In addition, field-based enumerators will be allowed to use…
  • "Can Wi-Fi Networks Be Completely Secure?"
    Researchers in China have reviewed different Wi-Fi hacking techniques that attackers have been discovered to use and suggested ways in which the security of a wireless infrastructure can be improved. Rogue AP, ARP spoofing, and Wi-Fi MITM are three of…
  • "How much does the average employee know about data privacy?"
    The 2018 Eye on Privacy report found that 58 percent of employees had never heard of the PCI Standard.  PCI Standards are a global set of payment card industry (PCI) guidelines that govern how credit card information is handled. It was…
  • "Further Details on Wipro Phishing Attack Revealed"
    More details have been shared by Flashpoint researchers, Jason Reaves, Joshua Platt, and Allison Nixon, pertaining to a phishing attack recently faced by the Indian IT consultancy firm, Wipro. Researchers have revealed that the perpetrators behind the…
  • "2 Million IoT Devices Vulnerable to Complete Takeover"
    More than two million Internet of Things (IoT) devices, including IP security cameras, baby monitors, and smart doorbells, have been discovered to be vulnerable to being hijacked by attackers. Through the take over of these devices, attackers would be…
  • "Data Privacy Research Front and Center at Human Computer Interaction Event"
    There are studies that have been conducted by researchers at the University of Michigan that explore best practices for phishing warnings and the flaws associated with breach notifications. Findings of research on data breaches reveal that most data…