News
-
"100,000-Strong Botnet Built on Router 0-Day Could Strike at Any Time"The latest variant of Mirai malware has been discovered to be using a more sophisticated approach than other versions that have released since the botnet’s source code was openly published. This new strain of Mirai is significant as it can infect two…
-
“Phishing Schemes Are Using Encrypted Sites to Seem Legit”A report sent out on Tuesday by research and defense firm PhishLabs shows that the use of HTTPS by attackers has increased exponentially with the push of website encryption by companies like Google. While the website encryption unnecessary for the…
-
"Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification"Sridhar Muppidi, IBM Security Systems’ chief technology officer for identity and access management solutions, emphasizes the importance of advancement beyond two-factor authentication (2FA) as it not the ultimate solution for the verification of…
-
“CyberX Security Researchers Demonstrate How to Jump the ICS/SCADA Air Gap at Black Hat Europe 2017”Security researchers at CyberX, a leading ICS security vendor, will demonstrate an attack in which Programmable Logic Controllers (PLCs) are targeted in order to jump the industrial control system (ICS) air gap and exfiltrate confidential information.…
-
"Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches"According to Saurabh Harit, researcher at Spirent SecurityLabs, vulnerabilities within devices such as the IV infusion pump and the digital smart pen could lead to an extensive data breach upon exploitation by hackers. Research conducted on the security…
-
"Game Theory Harnessed for Cybersecurity of Large-Scale Nets"Research being led by Purdue University in collaboration with Sandia National Laboratories aims to improve upon the cybersecurity of large-scale systems such as power grids, autonomous military defense networks, industrial control systems, consumer…
-
"HADES Misleads Hackers by Creating an Alternate Reality"Cyber researchers at Sandia National Laboratories are applying deceptive strategies in defending systems from hackers through the use of a recently patented alternative reality by the name of HADES (High-fidelity Adaptive Deception & Emulation System…
-
"75% of Insider Breaches Are Accidental"According to the Q3 GTIC Quarterly Threat Intelligence Report released by NTT Security, a majority of insider threats stem from accidental or negligent activities. Organizations can be at significant risk due to insider threats without being aware. This…
-
"Report Finds Millions of Insecure Devices in European Cities"According to a report released by Trend Micro, millions of smart-home gadgets within European cities have been discovered by researchers to be highly vulnerable to cyberattacks. Cities such as Berlin and London are highlighted as they contain the…
-
"Traveling This Holiday Season? Beware of RFID Attacks"Radio-frequency identification (RFID) is a technology that is commonly exploited by malicious criminals as it used for payment and access control in consumer and business operations. Malicious actors seek to capitalize on RFID attacks by accessing …
-
“Google AI Lets Phone Owners Know About Shoulder Surfers”Google researchers, Hee Jung Ryu and Florian Schroff, have demonstrated the use of a machine-learning and facial recognition system that they have developed to detect shoulder surfers. This system by the name of “Electronic Screen Protector with…