News
-
"Knowledge Is Power in the Fight Against Cyber Attacks Says the IISP"The Institute of Information Security Professionals (IISP) is an independent non-profit organization that is dedicated to the advancement of information security professionals’ knowledge and expertise in order to combat the evolution and growing…
-
"Half A Million Pacemakers At Risk Of Hacking, Security Protocols Immediately Needed"The U.S. Food and Drug Administration (FDA) has recalled more than 500,000 pacemakers. A pacemaker is a medical device used to help monitor and control a person's heartbeat. This massive recall of pacemakers is in response to vulnerabilities…
-
"What’s New in Ransomware?"Companies impacted by recent global outbreaks of ransomware have incurred great costs due to the payment of demanded ransoms, disruption of operations, loss of revenues, data loss, and much more. The total cost of damages inflicted by global ransomware…
-
"Researchers Block ISPs from Spying Through Your Smart Devices"A team of researchers from Princeton University have demonstrated a method that could be used to prevent Internet Service Providers (ISPs) from tracking users through Internet of Things (IoT) devices. In a paper, “Spying on the Smart Home: Privacy…
-
"New Cyber Security Regulations Now in Force in New York"The first transition period of new cybersecurity regulations that have officially been put into effect on March 1, 2017 in the State of New York has recently concluded with three more transition periods to go. Regulatory requirements are comprehensive as…
-
"The Security Management Gap Grows as Digital Threats Outstrip Defense Capabilities"RiskIQ has published its 2017 State of Enterprise Digital Defense Report, which reveals the most noted external digital threats faced by organizations and the level of confidence held by enterprise security practitioners in the management and defense…
-
"Researchers Successfully Perform First 4D Quantum Encryption"Researchers from the University of Ottawa in Canada have successfully demonstrated 4D quantum encryption by sending a high-dimensional quantum-encrypted message, using a free-space optical communication method to transmit the data between two buildings.…
-
Black Hat and Human FactorsBlack Hat has certainly established a strong reputation where security practitioners unveil some of the most impactful vulnerabilities, tools and techniques.
-
Cyber Scene #12 - Divided or United??Cyber Scene #12 Divided or United?? (no, not the U.S.--CyberCom and NSA)
-
"Newest Microsoft Report Issues Warning on Cloud 'Weaponization'"A new report released by Microsoft, warns of increased weaponization of cloud services by cybercriminals and hackers. According to the Microsoft Security Intelligence Report, cloud weaponization is a method in which an attacker infiltrates and commands…
-
"Defray Ransomware Used in Targeted Attacks on Education and Healthcare Verticals"New ransomware by the name of “Defray” has recently been discovered by researchers at Proofpoint, which is being used in a campaign to specifically target education and healthcare organizations. Researchers have revealed that this ransomware uses…
-
"This Mirai Malware Vaccine Could Protect Insecure Iot Devices"A team of researchers have developed a white worm by the name of “AntiBIoTic” to defend insecure Internet of Things (IoT) devices from outbreaks such as the recent Mirai DDoS attacks. This vaccine has been created by researchers using source code of…