News
  • “Google’s Project Zero Exposes Unpatched Windows 10 Lockdown Bypass”
    Researchers at Google’s Project Zero have released information and proof-of-concept for a bypass that affects Windows 10 S and 10 users with user mode code integrity enabled. Microsoft and Google are currently working toward finding a solution. This…
  • “DHS Prepares Cross-Sector Strategy to Limit Domino Effects from Big Cyberattacks”
    A new cyber strategy will be released by the Department of Homeland Security, which aims to alleviate the domino effects of cyberattacks on critical infrastructure sectors and government agencies. The strategy will also help to improve the security…
  • “70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks”
    Tripwire conducted a survey to which 151 IT and operational technology (OT) security professionals at energy, oil, and gas companies responded. An overwhelming majority of respondents expressed concerns surrounding the shutdown of operations and…
  • “This Ransomware Was Rewritten to Mine Cryptocurrency - and Destroy Your Files”
    Researchers at Trend Micro have discovered cryptocurrency-mining malware that appears to be rewritten from a form of ransomware called XiaoBa. In addition to performing unauthorized cryptocurrency mining, the malware also ruins users’ applications and…
  • "Intel Unveils New Threat Detection Technology"
    Intel recently announced the launch of two new technologies, Threat Detection Technology and Security Essentials. The Threat Detection Technology will improve upon the efficiency of scanning for cyberthreats, while Security Essentials will…
  • "Real-Time Detection of Consumer IoT Devices Participating in DDoS Attacks"
    Researchers from Princeton University have presented a way in which hacked consumer IoT devices being used to conduct DDoS attacks could be detected in real-time. A system designed by researchers to operate on network middleboxes, executes tasks such as…
  • "Developing Secure Mobile Apps"
    Mobile devices have become an essential part of our personal and professional lives. However, mobile applications are still vulnerable to attacks such as ransomware, spyware, and more. As mobile devices store personal data, it is crucial that mobile…
  • “Automated Bots Growing Tool For Hackers”
    A honeypot experiment carried out by Cybereason reveals the increasing use of automated bots by less-experienced attackers as the availability of such tools continues to grow. These bots could be used by attackers to automate the performance of tasks…
  • "Hack a VR System, Lead a Player Astray? Yes, Say Researchers"
    A team of researchers from the University of New Haven have highlighted the vulnerability of virtual reality (VR) systems to being hacked. Researchers demonstrated a malware attack on VR systems, HTC Vive and Oculus Rift, in which the view displayed by…
  • "Ransomware Incidents Double, Threatening Companies of All Sizes"
    Verizon's 2018 Data Breach Investigations Report (DBIR) shared key findings in relation to the perpetrators behind breaches, common types breaches, types of organizations that are most affected by such breaches, and security strategies. According to the…
  • "Researchers Create Malware That Steals Data via Power Lines"
    Researchers at the Ben-Gurion University of the Negev (BGU) demonstrated the possibility of extracting data from air-gapped computers through the use of power lines. PowerHammer is a technique developed by BGU researchers that could be used to perform…
  • "Army Scientists Uncover How to Stop Cyber Intrusions"
    A UCLA team of researchers funded by the U.S. Army discovered a signature of Majorana particles, which could be used to protect sensitive communication networks from intruders. The properties contained by Majorana particles could improve upon quantum…