News
-
"International data privacy laws create inconsistent rules"China’s new data privacy law went into effect on June 1, 2017. While this new regulation primarily rules over network operators and critical information infrastructure (CII), there is much concern pertaining to the extensive impact it may have on…
-
"Cybersecurity Experts Anticipate Growing Number of Attacks Against ERP Systems"A survey conducted by Crowd Research Partners with the help of ERPScan, reveals the lack of awareness and implementation of security measures within enterprises, though most cybersecurity professionals surveyed agree that the number of cyberattacks…
-
"Bolstering the security of inter-domain routing"The Border Gateway Protocol (BGP), which is the default routing protocol for directing traffic between organizations such as ISPs and Autonomous Systems, will be undergoing improvements to secure the inter-domain routing traffic exchange. The NIST is…
-
"App uses smartphone compass to prevent voice hacking"Voice-based smartphone apps can pose serious security threats to users via voice hacking. Attackers could use audio samples of users’ voices for impersonation to deceive people and digital security systems in order to retrieve sensitive information.…
-
"Cybercriminals Regularly Battle it Out on the Dark Web"A recent study conducted by researchers at Trend Micro reveals that cybercriminals within the Dark Web are not only attacking those outside of it, but also those who participate in it. This discovery was made when the security vendor constructed four…
-
"Cloak-and-Dagger Attack Creates Android Device Takeover Risk"Researchers at Georgia Tech have recently discovered a new attack by the name of “Cloak and Dagger”, which can allow cyberattackers to take full control over an Android device to perform further malicious activity. According to researchers, this attack…
-
"Tainted Leaks: Researchers Unravel Cyber-Espionage Attacks"According to privacy researchers at the University of Toronto’s Citizen Lab, a cyber espionage campaign allegedly connected to Russia, has launched phishing attacks by distributing false emails that appear to be from Google. This attack has targeted more…
-
"8,000 Vulnerabilities Found in Pacemakers"White Scope, a security research firm, have discovered vulnerabilities within pacemakers. The examination of seven different pacemaker programmers, which are produced by four different manufacturers, reveal a shocking 8,000 vulnerabilities risen by…
-
"Ensuring the security of digital information"The task of protecting large bytes of sensitive digital data that is created, stored, transferred, and exchanged, is quite massive for computer technicians and researchers. The possibility of breaching security is immense as well as the…
-
“Two exciting breakthroughs in autonomous vehicle cybersecurity, though questions remain”As vehicles become more autonomous and intelligent through the advancement of computerized systems and sensors to provide safer mobility, the potential infiltration of such technology will always be present. Researchers at the University of Virginia and…
-
"UK surveillance law raises concerns security researchers could be 'deputised' by the state"The planned establishment of UK’s surveillance laws are igniting concerns among computer scientists and security researchers within the UK as it has been brought to attention, the potential enforced compliance to disclose any discoveries of…
-
“Cisco and IBM Security announce services and threat intelligence collaboration”Cisco and IBM have announced their collaboration to improve upon products, services, and threat intelligence. Integration between Cisco security solutions and IBM’s QRadar is expected to increase the advancement of network, endpoint, and cloud security,…