News
  • "High-Fidelity Quantum Secret Sharing Prevents Eavesdropping"
    Researchers have studied the level of accuracy of quantum secrets following their transmission via noisy channels. The prevention of eavesdropping on quantum secrets has also been explored by researchers. This article continues to discuss the new study…
  • “Why Artificial Intelligence is Not a Silver Bullet for Cybersecurity”
    Within the last few years AI research has breached the forefront of security researchers’ and companies’ minds alike. A recent survey of CISOs has show that among three different categories, 32% of CISOs rely on AI technology for their cybersecurity…
  • "IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims"
    Dongguan Diqee 360 vacuum cleaners have been discovered by researchers at Positive Technologies to contain vulnerabilities. These vulnerabilities could be exploited by attackers to perform malicious activities such as remotely controlling the vacuum,…
  • "New Email Malware Detection Can Outperform the Top 60 Antivirus Engines"
    A new method for the detection of malicious emails has been developed by researchers at the Ben-Gurion University of the Negev (BGU). The method called Email-Sec-360 is said to be stronger than 60 industry-leading antivirus engines in the detection of…
  • "Decade of Research Shows Little Improvement in Websites' Password Guidance"
    In order to bolster the security of personal data, popular websites should enforce password-creation guidelines during the process of setting up online accounts. Research conducted by Steven Furnell, professor of Information Security at Plymouth…
  • "Could Semantic Icons Replace Passwords and PINs?"
    Researchers from Xi‘an Jiaotong-Liverpool University in China have developed an alternative mobile device authentication method. The alternative authentication system called SemanticLock involves the use of a chosen sequence of graphical images.…
  • "Microprocessor Designers Realize Security Must Be a Primary Concern"
    The discovery of critical chip vulnerabilities known as Meltdown and Spectre has called for microprocessor designers to prioritize security. Security must be taken into consideration during the design of microprocessors as vulnerabilities contained by…
  • “One Third of Businesses Lack a Cybersecurity Expert”
    A recent survey conducted by research director Rob McMillan of Gartner and research analyst Sam Olyaei, titled “2018 CIO Agenda survey”, polled over 3000 CIOs across 98 different countries.  The poll concluded, among other things, that only 65% of…
  • "Cryptojacking: Has Cryptocurrency-Mining Malware Already Reached Its Peak?"
    According to the Cybercrime Tactics and Techniques: Q2 2018 report released by Malwarebytes, there has been a decline in the launch of cryptojacking malware by hackers to infect machines and use their computing power to mine cryptocurrency. However, the…
  • "IoT Poses New Cybersecurity Threats for Cable"
    The increase in cyberattacks has raised major concerns among TV distributors that provide internet access to consumers. Inadequately secured IoT devices pose a threat to the security of cable. This article continues to discuss concerns and efforts…
  • "NHS Data Breach Caused Details of 150,000 Patients to Be Shared"
    The National Health Service (NHS) faced a data breach, which affected 150,000 patients. The breach occurred because of a coding error contained by software called SystmOne.  This article continues to discuss the data breach and actions taken by NHS…
  • "Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems"
    A team of researchers from Virginia Tech, University of Electronic Science and Technology of China, and Microsoft Research demonstrated the successful execution of a GPS spoofing attack on road navigation systems. The GPS spoofing attack allowed…