News
-
"Injection Attacks Common in Energy and Utilities Sector: IBM"According to a new report that has been released by IBM, the energy and utilities sector has faced a significantly higher increase in attacks in 2017. IBM has also observed that sixty percent of all attacks against the energy and utilities sector in 2016…
-
"Hackers send silent commands to speech recognition systems with ultrasound"A team of security researchers at Zhejiang University in China have a developed a method that they call “DolphinAttack”, which could be used to activate voice recognition systems with the use of high-frequency sound waves that are only detected by…
-
"Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy"Deception has always been a key strategy in war, politics, and commerce, but now this technique is being utilized more in the battle of cybersecurity. Cybercriminals have applied this technique through the development and launch of cyberattacks such as…
-
"Key-Logging Malware, Dubbed EHDevel, Found Intelligence Gathering"Security researchers have discovered complex malware that has been launched by attackers to gather intelligence, particularly targeting Indian and Pakistani individuals. This act of cyber espionage directed toward Indian and Pakistani entities has…
-
"Kansas, Missouri Collaboration Aims to Improve Regional Cybersecurity"In support of improving upon regional cybersecurity, agencies in Kansas and Missouri are collaborating in order to develop a strategic framework. The group leading this effort towards improving the cybersecurity of local governments is the Mid-America…
-
"Hackers Gain ‘Switch-Flipping’ Access to US Power Grid Control Systems"Security firm, Symantec, has warned that energy companies within the U.S. and Europe have been compromised by a number of cyberattacks, which allowed the infiltration of power grid operations by hackers. With unauthorized access to power grid operations…
-
"10 Tips for Reducing Insider Security Threats"Insider threats can pose significant risks to an organization’s data as emphasized by a report that has recently been released by the Institute for Critical Infrastructure Technology. The report highlights that a majority of cybersecurity incidents stem…
-
"Researchers Reverse 320 Million Hashed Passwords"Researchers have reversed the hashes of 320 million hashed passwords revealed by an online service, “Pwned Passwords”, created by security researcher, Troy Hunt, which allows users to search through a database of breached passwords in hopes of preventing…
-
"Approach Enables Experts to Look Beyond IP in Cyber Security Investigations"Cybersecurity experts at the University of Plymouth have developed a technique, which would improve upon recognition performance within digital forensic investigations by enabling investigators to examine an individual suspect’s use of the internet. This…
-
"New Locky Ransomware Tactic Could Fool Sandboxes"Researchers at Malwarebytes have discovered a new technique from a new variant of Locky ransomware that is being used to evade sandbox detection. The new variant of Locky ransomware is distributed through spam emails, which can then be triggered…
-
"7 Things to Know About Today's DDoS Attacks"Distributed denial-of-service (DDoS) have become a significant threat to most organizations. The persistency and sophistication of DDoS attacks has grown as resources to launch such attacks have become more available to attackers. The multi-vector DDoS…