News
-
“Is the world ready for GDPR? Privacy and cybersecurity impacts are far-reaching”The General Data Protection Regulation (GDPR) will go into effect on May 25, 2018. The GDPR consists of rules enforced by the European Commission to govern the privacy and security of personal data. Though this regulation is being put forward by the…
-
"DHS wargames included a scenario similar to WannaCry"Before the launch of WannaCry malware, the Department of Homeland Security conducted a national drill to observe the reactions of the government and the private sector in the case of a multi-sector cyberattack targeting critical infrastructure. It has…
-
"Network traffic provides early indication of malware infection"Researchers reveal the capability of detecting malware infection far in advance with the examination of malware-related network traffic carried by an ISP preceding the actual detection of malware. In the study of this new malware-independent…
-
2017 ISEF Winners of NSA RD AwardsAnd the National Security Agency Research Directorate Awards Winners are:
-
"Fujitsu high-speed technology identifies within minutes damage from cyberattacks"Fujitsu has announced a high-speed forensic technology that they have developed to identify the degree to which an organization's intranet has been damaged after a targeted cyberattack. Fujitsu's new technology shortens the average time required to…
-
"Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys"An 11 year old boy named Reuben Paul performed a demonstration at a cybersecurity conference, showing the weaponisation of interconnected smart toys through the infiltration of Bluetooth devices, which left the audience astonished. This article discusses…
-
"Unraveling mobile banking malware, Check Point"Check Point researchers have conducted an investigation to decipher the operation behind banking malware. It has been discovered that the development and operation of banking malware requires little skill with the availability of simplified tools and…
-
"What's next for NIST cybersecurity framework?"Officials at an NIST event emphasize the importance for constant maintenance of cyber procedures as the evolution of attacks continue. It is essential for companies to perform continuous maintenance so that in the case of an attack, operations aren’…
-
"Oddities in WannaCry ransomware puzzle cybersecurity researchers"The massive spread of the WannaCry ransomware to more than 100 countries within a few hours have left cybersecurity researchers baffled as to how this attack was initiated, the rapid speed of which it spread as well as how the hackers behind this attack…
-
"Keylogger Found in Audio Driver of HP Laptops"Researchers at Modzero, a Swiss cybersecurity firm, have revealed their discovery of a keylogger hidden within audio drivers of HP laptops. This feature found in the audio driver is identified as a keylogger as it records and saves all of a user’s…
-
"DHS S&T’s Transition to Practice program unveils 2017 cohort"Researchers at federally funded laboratories and academic research centers are prepared to introduce new cybersecurity technologies that they have developed to the commercial market. The eight new technologies will be showcased by DHS Science and…
-
"President Trump signs cybersecurity executive order"The highly anticipated executive order addressing cybersecurity has been signed by President Trump. Tom Bossert, Trump’s homeland security adviser, states that the order has been devised to achieve the president’s goal to protect the security of America…