News
-
"At RSA, doubts abound over US action on cybersecurity"There has been much discussion about how the U.S. should respond to cyberattacks, especially after alleged attempts of cyber intrusion into the 2016 U.S. election. Lawmakers and officials have expressed great concern for this issue, stating views that…
-
"Dozens of iOS Apps Vulnerable to WiFi Snooping"It has been discovered by Will Strafach, CEO of Sudo Security Group, that many applications for Apple’s mobile devices are vulnerable to WiFi snooping. As of right now, 76 iOS apps have been identified as susceptible to wireless prying despite assumed…
-
"Change In Corporate Mindset Needed To Combat Cyber Attacks"Despite the recent data breaches of major companies such as Yahoo!, Sony, and Target, some corporate boards and C-level executives are still not appropriately prioritizing cybersecurity. This article discusses how much cybercrime may cost businesses in…
-
"PKI: Essential for Medical IoT"As the healthcare industry increasingly becomes more integrated with IT innovations, the concern for better authentication and encryption deepens. Data transmission must be secure through proper SSL encryption and digital certificates. The lack of secure…
-
"Another New Programming Language, This One for Security"Scramblecode is another new programming language that has been introduced by Danish software vendor, ProgramPartner ApS. This new programming language focuses on encrypting and securing code through the implementation of memory encryption tools. This…
-
"Verizon Data Breach Digest Triangulates Humanity Inside Security"Verizon has released a comprehensive data breach report that covers a wide-range of attack scenarios. This report identifies potential targets, characteristics, patterns, and complexity measurements of different attacks that may be launched at a system.…
-
"IoT Cybersecurity Alliance to focus on security challenges"AT&T, IBM, and Nokia has teamed up to combat security challenges, particularly in relation to IoT cybersecurity. A survey conducted in 2016 revealed that 58% of companies lacked confidence in the security they put in place to protect their devices…
-
"Windows Trojan hacks into embedded devices to install Mirai"It has been discovered that embedded devices are also susceptible to being hacked with Windows and Android malware. Mirai is a malware program that targets Linux-based devices such as IP cameras and digital video recorders to launch DDoS attacks. This…
-
"Memory-Based Malware Uses PowerShell Scripts, Pentest Tools to Evade Detection"Researchers at Kaspersky Lab have discovered a memory-based malware that bypasses detection via PowerShell scripts ran within the Windows registry and penetration testing tools. As of right now, this malware has attacked 140 organizations within 40…
-
"The Fight Over Email Privacy Moves to the Senate"The US House of Representatives has passed the Email Privacy Act (H.R. 387). This act would require law enforcement to attain a search warrant before having access to private emails and other documents held with cloud storage providers such as…
-
"Protecting Smart Grids and Critical Infrastructure Are Top Concerns for Energy and Utility Firms"As the energy market relies on technological innovations such as machine learning to increase efficiency, the concern for cybersecurity deepens. Although advancements such as smart electricity grids and digital oil fields offer increased…
-
"Quantum Computing Paranoia Creates a New Industry"Although research and development of quantum computers is still in progress, security companies are already anticipating breaks in encryptions due to quantum computing capabilities. The National Institute of Standards and Technology suggests the…