News
-
“NIST Advocates Use of Longer Passwords to Improve Security”The U.S. National Institute for Standards and Technology (NIST) has updated its guidelines in support of increasing the complexity of passwords through the creation of longer passwords. According to NIST Special Publication 800-33B titled, “Digital…
-
"Microsoft PowerPoint exploit used to bypass antivirus and spread malware"Researchers at Trend Micro have discovered a cyberattack in which a vulnerability is being exploited by attackers to circumvent antivirus software and distribute Trojan malware via Microsoft PowerPoint files. The vulnerability being exploited to deliver…
-
"A Deep Flaw in Your Car Lets Hackers Shut Down Safety"In 2015, researchers performed a demonstration in which they hijacked a moving Jeep to manipulate its driving functions such as steering, accelerating, and breaking. Ever since this discovery, the auto industry has made attempts at preventing the hacking…
-
"Medical devices and the Internet of Things: Defending against cyber threats"Deloitte surveyed professionals within the Internet of Things-connected medical device ecosystem, revealing what they think is the biggest challenge facing the medical industry in relation to cybersecurity. According to respondents, the…
-
"Hackers See Privileged Accounts as Best Route to Sensitive Data"A survey conducted by Thycotic at the Black Hat 2017 conference reveals the perspectives of hackers on the protection of critical data. According to the survey, hacking privileged accounts is the pathway that is most preferred by hackers to gain quick…
-
"Cybercriminals are not as 'anonymous' as we think"The key to solving cybercrimes is to understand the human side of cybercriminals in relation to their living situation, activities, operations, and who they know. Researchers of the Human Cybercriminal Project in Oxford’s Department of Sociology have…
-
“Hackers' Little Helpers: Employees With Bad 'Cyberhygiene'”The National Association of State Chief Information Officers (NASCIO) have identified cybersecurity as the top priority above other priorities pertaining to policy and technology. The discussion of cybersecurity often places focus on the systems side…
-
“How HHS’ HCCIC Will Improve Healthcare Cybersecurity”Per recent analysis from the Institute for Critical Infrastructure Technology (ICIT), HHS’ Healthcare Cybersecurity and Communications Integration Center (HCCIC) will greatly improve upon cybersecurity within healthcare organizations as well as…
-
"Poor Password Policy? New Study Probes Prevalent Protection Problems"Dashlane, a password management service, conducted a new study that reveals the quality of password policies implemented by popular web services such as Amazon, Dropbox, QuickBooks, and more. The study conducted, analyzed 40 popular online portals using…
-
"New Consortium Promotes Proper Data Sanitization Practices"The International Data Sanitization Consortium (IDSC) has been developed by a group of security experts to provide guidance in the process of properly sanitizing data on hardware devices such as hard drives within data centers, medical equipment,…
-
"How to protect personally identifiable information under GDPR"Enforcement of the European Union’s General Data Protection Regulation (GDPR) officially begins on May 25, 2018. The GDPR will have a far-reaching impact as any company that conducts business with EU citizens will be expected to comply with this…
-
"Fuzz testing finds industries left vulnerable by unsecured software"The Synopsys’ State of Fuzzing 2017 report reveals that open source protocols and common file formats used within six different industries, likely contain zero day exploits. The report derives from more than 4.8 billion fuzz tests performed by…