News
-
"Microsoft Seeks Global Cybersecurity Accord"Microsoft wishes to develop a “Digital Geneva Convention” through the cooperation of governments around the world with the hopes of establishing international strategies and rules to combat cybersecurity threats and safeguard the internet for civilian…
-
"New Cybersecurity Certification First To Address Behavioural Analytics"CompTIA has announced a new cybersecurity certification, CompTIA Cybersecurity Analyst (CSA+). This certification is the first to incorporate behavioural analytics to detect and counteract cyber threats. Cyberattacks have become increasingly more complex…
-
"Southern Rail ticket kiosks allegedly open to cyber-attack"Security researchers have discovered security vulnerabilities in Southern Rail ticket kiosks that could easily be exploited by attackers. Although one spokesperson claims that the machines do not hold personal or confidential information, security…
-
"The Bright-Eyed Talking Doll That Just Might Be a Spy"The Federal Network Agency alarmed parents in Germany of the probable exploitation of their child's privacy through Cayla, the talking doll. It has been discovered that this doll could be hacked to steal and reveal personal information through…
-
"Closing The Cybersecurity Skills Gap With STEM"As the number of cybersecurity threats and attacks increase, the concern for the lack of skilled cybersecurity professionals deepens. Cyberattacks have become alarmingly more complex, which demands for highly skilled cybersecurity experts to…
-
"Russian Black Hat Hacks 60 Universities, Government Agencies"A familiar Russian hacker by the name of Rasputin has compromised systems of more than 60 universities and U.S. government agencies. Rasputin is known for launching SQL injection attacks to steal and sell the hacked information. This…
-
"RSAC: Panel - Encryption and Back Doors: The Line Between Privacy & National Security"At the RSA Conference 2017, a panel of security experts shared their thoughts on the topic of distinguishing privacy from national security through encryption and back doors. These security experts discuss what they think encryption and the concept of…
-
"Security in the cloud"Former CIO, Richard Spires, discusses the significant benefits and growth of innovative cloud computing along with the concerns of managing cloud security. Spires also discusses how companies should scope out third-party IT cloud service providers as…
-
"New Android Trojan masquerades as flash player update to install malware"Security researchers at ESET have discovered a new Trojan malware that targets Android devices. This malware presents itself as an Adobe Flash Player application update to be granted access by victims. The malware then proceeds to manipulate…
-
UK Opens new National Cyber Security CenterQueen Elizabeth II on Tuesday inaugurated Britain's new National Cyber Security Center that will work to protect the country from online attacks. It is located in London and is being setup to protect the UK government from cyber attacks. It is a new part…
-
"A Chip Flaw Strips Away Hacking Protections for Millions of Devices"Researchers have discovered a new technique that further simplifies the process of hacking software and hardware by exploiting the ways in which the microprocessor and memory function together. This article discusses ways in which this attack…
-
"Active Directory Mismanagement Leaves Huge Numbers of Orgs Vulnerable"Security assessments show that many organizations are not properly handling AD administrator’s credentials. This article discusses ways in which poor AD management falls short in security as well as the suggestions of Skyport and Microsoft to improve…