News
  • "Tesla’s Model 3 Will Be the Prime Target at Upcoming Hacker Contest"
    Pwn2Own is a hacking contest in which ethical hackers are encouraged to find vulnerabilities in programs. An upcoming Pwn2Own contest in Vancouver will focus on the Tesla Model 3. Tesla welcomes security researchers to probe its …
  • "The Quiet Threat Inside ‘Internet of Things’ Devices"
    The number and utilization of Internet of Things (IoT) devices continues to increase at a rapid rate. However, the security of IoT devices remains insufficient, leaving such devices vulnerable to being taken over by hackers. This article continues…
  • "Phishing Attacks Bypass Two-Factor Authentication"
    Security researcher, Piotr Duszynski, has released a tool, called Modishka. Modishka is a penetration testing tool that can be used to simplify the execution of phishing campaigns. The tool can also be used by hackers to circumvent two-factor…
  • "Arm Yourselves for Healthcare’s Cybersecurity War"
    The U.S. healthcare industry continues to be one of the industries most targeted by hackers due to the large amount of sensitive data stored and exchanged by systems used within this industry. As a result, the U.S. Department of Health and Human Services…
  • "Why Security by Design and Security DevOps Are so Critical to Success"
    As technology continues to advance, there must be more consideration surrounding the security of technologies during their design. It is important that SecDevOps (Secure Development Operations) is further adopted by companies to ensure the implementation…
  • "Use Edge Computing for IoT Security, Says IEEE"
    IEEE (Institute of Electrical and Electronics Engineers) researchers call for the implementation of a new security framework aimed at securing the Internet of Things (IoT), which involves the use of edge computing. This security framework suggests the…
  • "Hacker Uses Early Warning System for Fake Message Campaign"
    Systems used by an Australian company, called the Early Warning Network (EWN), were recently infiltrated by a hacker. EWN provides alerts pertaining to severe weather, floods, bushfires, and more, to Australian citizens. The compromise of systems used by…
  • "To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers"
    Recent claims surrounding the infiltration of the U.S. technology supply chain by China's military to conduct espionage call for public and private sector organizations to take further action to reduce IT supply chain risks. Organizations are urged to…
  • "Blockchains in Real Time"
    Sebastian Faust, Professor of Applied Cryptography, and his team of cryptography researchers at Darmstadt University of Technology are working to improve the performance of blockchain transaction processing while also ensuring the security of blockchain…
  • "New Variant of Mirai Malware Exploits Weak IoT Device Passwords to Conduct Brute-Force Attacks"
    Security researchers at Trend Micro have uncovered a new variant of Mirai malware, called Miori. Miori is delivered through the exploitation of a remote code execution (RCE) vulnerability contained by the ThinkPHP programming framework. This article…
  • "Five Emerging Cyber-Threats to Worry About in 2019"
    2018 was an eventful year in regard to cybersecurity disasters such as large-scale data breaches, ransomware attacks, and the discovery of major security vulnerabilities contained by microchips. There are new threats that cyber defenders should be…
  • "From Encrypting the Web to Encrypting the Net: 2018 Year in Review"
    Great improvements were made in 2018 pertaining to web encryption. A significant number of websites have adopted HTTPS (Hyper Text Transfer Protocol Secure) due to the efforts of the Electronic Frontier Foundation (EFF), Google, and more. EFF will…