News
-
"Advanced Deception: How It Works & Why Attackers Hate It"The growing complexity and frequency of cyberattacks call for advanced methods to enhance the detection and prevention of such attacks. Deception is a cyber defense technique that is drawing more attention from organizations as it could be used to detect…
-
"Schools Are ‘Vulnerable’ To Heating Hacks"An examination of smart building controllers conducted by security research firm Pen Test Partners, reveals the vulnerability of such systems to hacking. Researchers looked at building management system controllers manufactured by Trend Control Systems…
-
“FCC Votes to Repeal Net Neutrality, Could Increase Cybersecurity Threats”The repeal of net neutrality is predicted to decrease the transparency of the Internet, which could increase cybersecurity threats. Without net neutrality, ISPs would have the authority to alter content or its transmission through their…
-
"'Cyberbiosecurity' and Protecting the Life Sciences"In a paper titled “Trends in Biotechnology”, Jean Peccoud and co-authors aim to spread awareness of cyberbiosecurity as the advancement of biotechnology calls for new methods to secure assets of life sciences. The paper touches upon the…
-
"Nation State Attackers Shut Down Industrial Plant with New ICS Malware"Security researchers at Mandiant have discovered a new malware called Triton, which is capable of deactivating systems put in place to control a variety of industrial processes. Hackers used Triton to compromise Schneider Electric's Triconex Safety…
-
“Individualism May Make You Better at Catching a Phish: Research”A new study conducted by a team of researchers from Australia's Defence Science and Technology Group (DST) and the University of Adelaide suggests that national culture plays a significant role in the discernment of phishing scams. In addition to…
-
Open for Nominations!The 6th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 30, 2018. We look forward to receiving your nominations.
-
“Your Smartphone’s Next Trick? Fighting Cybercrime.”A new way in which cybercrime can be prevented has been discovered by a University at Buffalo-led led team of researchers. Each smartphone device is unique as a result of the obscure variations within each smartphone camera’s sensors, which are created…
-
“Improving Cyber Security in Harsh Environments”Protecting the data of military personnel is critical as the exposure of their information to adversaries could pose serious threats to their safety. The military, along with businesses and individuals are seeking to improve upon the efficiency of…
-
Humans are where Cybersecurity Needs to StartRecent article in the Harvard Business Review talks about how cybersecurity security starts with the employees. There are behavior issues there and they are predictable. This means we can deal with it. It pretty much reinforces the idea that psychology…
-
"Researchers Find Trove of 1.4 Billion Breached Credentials"Security researchers at 4IQ, a dark web analysis firm, have found a database on the dark web that holds a shocking 1.4 billion breached credentials. The database combines credentials deriving from 252 previous breaches. The process of hijacking accounts…
-
"AIG Creates New Model to Score Client Cyber Risk"A new cyber benchmarking model has been developed by American International Group, Inc. (AIG), a top global insurance organization. The new model will be used to asses the cyber risk of clients based on a variety of common attack patterns and widely-used…