News
-
"82% of Security Pros Fear Hackers Using AI to Attack Their Company"A new report released by Neustar highlights the thoughts of security professionals in relation to artificial intelligence (AI) and cyber threats faced by their organizations. Findings of a survey conducted by Neustar to which 301 senior technology and…
-
"The U.S. Needs a Cybersecurity Civilian Corps"The establishment of a Civilian Cybersecurity Corps similar to that of the Civil Air Patrol and Coast Guard Auxiliary has been proposed as a way to further bolster the U.S. against cyber threats. The Civilian Cybersecurity Corps would be composed of…
-
"My Thoughts Are My Password, Because My Brain Reactions Are Unique"Biometric authentication using identifiers such as fingerprints, faces, and retinas is becoming increasingly popular as these physical characteristics provide a higher level of security by being harder to replicate. However, these forms of biometric…
-
"DevSecOps An Effective Fix for Software Flaws"A recent report released by Veracode, titled State of Software Security, finds that the speed at which software vulnerabilities are remedied by organizations correlates to the number of times developers scan their code for these vulnerabilities each year…
-
"5G and 6G Wireless Technologies Have Security Issues"Security gaps have been discovered to be contained by 5G and 6G wireless network standards. Resent studies conducted by researchers have uncovered security vulnerabilities in these network standards that could allow attackers to perform activities such…
-
"Cybercriminals Follow the News Too and Change Tactics Accordingly"Threat Vector researchers have brought attention to the adaptation of threat actors to the exposure of their operations, tools, and techniques by publications. Threat actors will continue to alter their malicious activities in an attempt to escape the…
-
"New Technology from Purdue Advances Protection of Critical Systems from Insider-Assisted Attacks"A new covert defense algorithm has been developed by a team of researchers at Purdue University. The algorithm applies techniques aimed at misleading attackers in the targeting of critical systems such as nuclear plants, driverless vehicles, refineries,…
-
"At Least 57 Negative Impacts from Cyber-Attacks"Cybersecurity researchers from Kent's School of Computing and the Department of Computer Science at the University of Oxford have presented findings of a study in which they delved deeper into the negative impacts of cyberattacks. They have found at…
-
"Hackers Steal Data of 75,000 Users After Healthcare.Gov FFE Breach"A HealthCare.gov sign-up system, named Federally Facilitated Exchanges (FFE), has been breached by hackers. The system is used by healthcare insurance agents and brokers to help people sign up for the coverage available on HealthCare.gov. Personal…
-
"AWS FreeRTOS Vulnerabilities Could Crash IoT Devices, Warn Cyber Security Researchers"Security flaws have been discovered in an operating system that is commonly used in IoT devices. The 13 flaws discovered in the FreeRTOS operating system could allow hackers to disrupt the operations of IoT devices, leak data, and more. This article…