News
-
"Why you might trust a quantum computer with secrets, even over the internet"Researchers in Singapore and Australia have discovered a technique that could allow data, calculations, and programs being ran by a user to be hidden from the quantum computer, of which the user is operating over the internet. The technique…
-
"Industrial control security practitioners worry about threats … for a reason"The SANS Institute recently surveyed professionals within the Industrial Control Systems (ICS) security field to collect information and get a better understanding of their mindsets towards the security of their systems in regards to threats,…
-
"Watch out for this money stealing macOS malware which mimics your online bank"A strain of Apple Mac malware by the name of OSX.Dok was first discovered in May 2017 to have infected all versions of the older OS X operating system. This malware infection was originally launched to snoop on the web traffic of victims, however it has…
-
"How Active Intrusion Detection Can Seek and Block Attacks"John Ventura, practice manager for applied research at Optiv, will be demonstrating a more effective method to performing intrusion prevention at Black Hat USA. This method includes the placement of situations where attackers can accidentally expose…
-
"Researchers Remotely Hijack Oracle OAM 10g Sessions"Security researchers, Nabeel Ahmed and Tom Gilis, have discovered issues within Oracle Access Manager (OAM) 10g that could allow attackers to remotely hijack sessions. As revealed by the researchers, these issues include the redirection of users…
-
"BEC scams: How to avoid them and how to fight back"Enterprises are frequently bombarded with phishing and spear phishing emails. While most companies have implemented security measures such as antivirus systems and spam filters to combat such attacks, these security methods are still insufficient in…
-
"IARPA explores easy-to-use cryptography"The Intelligence Advanced Research Project Activity (IARPA) plans to provide a framework through the Homomorphic Encryption Computing Techniques with Overhead Reduction (HECTOR) program, which will serve to help system architects and application…
-
"Verizon Breach: 6 Million Customer Accounts Exposed"Verizon has faced a massive breach as 6 million customer accounts have been exposed. Data that has been exposed include names, addresses, phone numbers, customer PIN codes, and more. Researcher from the cyber risk team at UpGuard, Chris Vickery,…
-
"Research: businesses over confident about ability to fend off hackers"Findings of Gemalto’s fourth-annual Data Security Confidence Index show that a majority of IT professionals are overconfident in perimeter security technologies such as antivirus and firewalls. The concentration on perimeter security, however, is…
-
"New solution prevents bots from accessing API servers"Distil Networks has developed a new solution to preventing access to API servers from bots, which will be provided through Bot Defense for Mobile App APIs. Attacks such as brute force, online fraud, compromise of accounts, and many others, often arise…
-
"UCI Cybersecurity Policy & Research Institute Launches Initiatives to Combat Cyber Threat"The Cybersecurity Policy & Research Institute (CPRI) at the University of California, Irvine proposes to take action against vulnerabilities and cyberattacks through the development of research projects, improved information sharing, law enforcement…
-
"Enterprise Complexity Requires New Security Approaches"According to a report from Aberdeen Group, improving upon the speed of detecting and responding to cyberattacks, significantly reduces the impact on the availability of enterprise computing infrastructure. This report also reveals rates in which…