News
  • "Hackers Turn to Python as Attack Coding Language of Choice"
    A report released by Imperva brings attention to the increasing popularity of the Python programming language amongst attackers in the development of attack tools. According to the report, an estimate of 77 percent of attacks against sites observed by…
  • "ESET Has Discovered the First UEFI Rootkit in the Wild"
    ESET security researchers have found a Unified Extensible Firmware Interface (UEFI) rootkit. The UEFI rootkit, called LoJax, has been reported to be the first of its kind to be discovered in the wild by researchers. This article continues to discuss the…
  • "UBC Study: Publicizing a Firm's Security Levels May Strengthen Security over Time"
    As cyberattacks continue to increase in number and complexity, organizations need to be more aware of their security issues. Findings of a study conducted by researchers at UBC Sauder School of Business call for the security awareness of organizations to…
  • "New Virobot Ransomware and Botnet Emerges"
    A new threat called Virobot was recently discovered by security researchers at Trend Micro. Virobot has the capabilities of both ransomware and botnets in that it encrypts files and adds the infected machine to a spam botnet. Trend Micro researchers have…
  • "Mobile Websites Can Tap Into Your Phone's Sensors Without Asking"
    Researchers have discovered that many mobile websites have been accessing smartphone sensors such as those used for motion, light, and proximity, without the permission of users. These websites include Wayfair, Priceline, Kayak, and more. This article…
  • "A New Cybersecurity Research Group Focuses on Human Behavior"
    Human behavior is the focus of the Evidence-based Cybersecurity Research Group led by David Maimon at Georgia State University. The research conducted by this group delves deeper into the interactions of major actors in the cybercrime ecosystem, which…
  • "Security Researcher Fined for Hacking Hotel Wi-Fi and Putting Passwords on the Internet"
    A security researcher named Zheng Dutao was recently fined as a result of an unauthorized hack into a hotel’s Wi-Fi system and publishing of a blog post pertaining to the hack. The incident highlights the importance of properly disclosing security issues…
  • "Think Like An Attacker: How a Red Team Operates"
    An organization can bolster their defenses against cyber threats through the establishment of a red team. A red team finds different ways in which threat actors could compromise an organization by acting as the adversaries. This article continues to…
  • "Why Humans Are Necessary to the Threat Hunting Process"
    Human Intelligence (HUMINT) is a source of intelligence that is often disregarded in the performance of cyber threat intelligence gathering. The gathering of human intelligence can help in defending organizations from cyberattacks in the long term.…
  • "Hackers Target Real Estate Deals, with Devastating Impact"
    According to a report released by the FBI's Internet Crime Complaint Center, there has been a significant increase in the percentage of those that have fallen victim to email fraud involving real estate transactions. Losses have also been reported to be…
  • "Meet EyeTell, the Next Threat to Touch-Screen Passwords"
    Researchers at Arizona State University have demonstrated a tactic that could be used by hackers to figure out a user’s passcode, PIN, or lock pattern. The technique has been demonstrated through the use of a digital tool called EyeTell, which could…
  • "Computer Scientist Working to Test Security of IoT Systems, Blockchains"
    Researchers have been awarded a grant by NIST to develop a new way in which software systems can be securely tested. The new method to security testing being developed by researchers aims to prevent vulnerabilities deriving from errors made in the…