News
  • "Experts Explore Mystery of Security Metrics"
    The AFCEA Cyber Committee explored the area of security metrics by surveying and interviewing organizations with cybersecurity programs. The results from these surveys and interviews further highlight that measuring the adequacy of cybersecurity…
  • "New Attacks (and Old Attacks Made New)"
    In todays world new malware and zero-day attacks are reasonably rare and are vastly outnumbered by reconfigured malware and the regular return of old attacks.  It is important to be prepared for the new attacks, however it is also very important to…
  • "Aftershock-3PC: Polymorphic Malware Attack on 200+ Premium Publishers"
    A new form of malware targeting ad networks, called AfterShock-3PC, is said to have been designed to circumvent signature-based detection in that it continuously alters its identifiable features. According to the Digital Security and Operations (DSO)…
  • "TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids"
    Researchers at Pen Test Partners have uncovered vulnerabilities contained by a popular Australian smartwatch for kids, called TicTocTrack. Parents can track the location of their children via the smartwatch. According to researchers, the vulnerabilities…
  • "Privacy 'Poisoning' Poses Threat to Companies Using Blockchain"
    Blockchain technology can be made unusable through the launch of a privacy poisoning attack. A privacy poisoning attack is a new kind of cyberattack that can be performed by loading private data such as names, home addresses, credit card numbers, and…
  • "Cyber security – should your business be worried?"
    Every business no matter how big or small relies on computers and digitalization to perform their basic functions.  If a company is breached, then it can cost a lot of money for the company to fix and mitigate the affect of the attacks. Every…
  • "DHS Alerts Industry to Insecure Enterprise VPN Apps"
    The Department of Homeland Security (DHS) recently issued an alert to the public pertaining to the presence of a vulnerability in virtual private network (VPN) applications made by Cisco, F5 Networks, Palo Alto Networks, and Pulse Secure. According to…
  • "Report: Healthcare Is No. 1 - For Breaches"
    Healthcare organizations are ranked number one when it comes to being affected by breaches.  Once an attacker gained access to a device or an account, the most common next steps were accessing an Office 365 account (34 percent); roaming the network…
  • "The Cybersecurity Workforce Shortage Is a Big Problem. You Can Help Girl Scouts Solve It."
    In support of closing the cybersecurity workforce gap, the Girl Scouts launched a program aimed at strengthening the cybersecurity skills of young girls. Within the first six months of the program, 44,000 cybersecurity badges were earned by girls in…
  • "Building Biologically-Inspired Software"
    Engineers in the Department of Electrical Engineering at the University of South Florida have developed new network protection software that is based on the human immune system. Researchers looked at the mechanisms of human immune system to see how they…
  • "Popular Video and Sound Editing Website VSDC Hacked to Propagate Banking Trojans"
    Security researchers at Doctor Web discovered the compromise of the popular video editing website, VSDC, by hackers. Download links on the VSDC website were hijacked in order to infect the video editing website with a banking Trojan (Win32.Bolik.2) and…
  • "Majority of Organizations Lack a Cybersecurity Incident Response Plan"
    Findings of a study on cyber resilience by IBM Security and the Ponemon Institute indicate that the majority of organizations do not have a cybersecurity incident response plan in place in the event that a cyber incident occurs. The implementation of…