News
-
"Hackers accidentally create network-busting malware"Arbor Networks has presented new details of the latest variant of the Mirai botnet, which has been designed to exploit IoT devices in one network to launch attacks on another. It has been revealed by researchers that this variant could knock networks…
-
"Creating a Common Language Of Cybersecurity"In support of creating a common language for the management and reporting of cyber threats to government organizations and industries, the Office of the Director of National Intelligence is developing standard definitions to improve the communcation and…
-
"The National Crime Agency is sending hackers to rehab"The National Crime Agency has developed a cyber-rehabilitation program for young hackers in hopes of encouraging the use of such skills for good. The first two-day camp of the “Prevent” program was held in July with all attendees being perpetrators of…
-
"Homograph attacks: Don’t believe everything you see"ESET security researchers have brought attention to homograph attacks, which could potentially pose significant threats to users as it advances the act of spoofing. Fraudulent websites can be designed to appear secure as attackers could convert the…
-
"House Panel Passes Bills to Reorganize DHS Cyber Team and Collect Zero-Day Info"The U.S. House Committee on Homeland Security passed two bills that aim to restructure the Department of Homeland Security’s (DHS) cybersecurity operations and establish a report on practices performed by the government in the process of…
-
"How one small hack turned a secure ATM into a cash-spitting monster"IOActive researchers have demonstrated the possibility of a hacker infiltrating an ATM machine to exploit a vulnerability, which could allow all of the money within the machine to be dispensed until complete depletion. This demonstration highlights the…
-
"Industroyer malware a turning point for ICS security"Security researchers have shared further analyses of the “Industroyer” malware that targeted Ukraine’s power grid in December 2016. Researchers from ESET and Dragos, Inc., have shared their research in a presentation at Black Hat, in which they…
-
"New Form of Cyber-Attack Targets Energy Sector"Energy companies are being targeted by a new form of spear-phishing attack. CyberInt has discovered this attack to be difficult to detect as the distributed “lure” email consisting of an attached Word document does not contain any malicious code, making…
-
"Bot vs Bot in Never-Ending Cycle of Improving Artificial intelligence"The utilization of artificial intelligence through the implementation of machine learning is expected to defeat the attacks of malware and hackers by many in the cybersecurity field, however others believe this technology does not offer the ultimate…
-
"10 Critical Steps to Create a Culture of Cybersecurity"Although incidents of cyberattacks targeting organizations are constantly headlined to promote awareness of such attacks, many businesses still lack sufficient tools and procedures for the protection of their systems and data. Cyber incidents pose major…
-
"A Clever New Tool Shuts Down Ransomware Before It's Too Late"A new tool called ShieldFS has been developed by Andrea Continella and his team of researchers to automatically detect ransomware and perform a system restore from backups before the targeted system can be locked down by hackers. This tool performs by…
-
NSA SoS Lablet Call for Proposals is OpenThe National Security Agency has distributed its BAA (really a request for proposals) for its next generation of SoS Lablets. These lablets include lablets on the 5 Hard Problem areas in Science of Security, on the Science of Privacy and dealing with…