News
-
"Facebook Says Hackers Accessed Data of 29 Million Users"50 million Facebook accounts were initially reported to have been affected in a breach faced by the social media giant in late September. However, the company has recently reported that fewer accounts were actually impacted in the breach. According to…
-
"Computer Science Research Aids in Mitigating Cyberthreats in Vehicles"As car systems have been shown to be vulnerable to cyberattacks, researchers have developed a way in which cyberattacks on such systems could be detected. The detection system makes use of a neural network in the recognition of anomalies in car…
-
"Many of the U.S. Military’s Newest Weapons Have Major Cyber Vulnerabilities: GAO"A new report from the Government Accountability Office (GAO) reveals the presence of mission critical cyber vulnerabilities in many weapons used by the U.S. military, including those that are currently being developed. According to the report, these…
-
"FDA Warns Users of Cyber Vulnerabilities in Pacemaker Programmers"A warning has been issued by the Food and Drug Administration (FDA) pertaining to the vulnerability of pacemaker programmers to being accessed by hackers. The FDA specifically warns of the vulnerability of two models of programmers manufactured by…
-
"Stringent Password Policies Help Prevent Fraud, Study Finds"The poor practice of reusing passwords to log into multiple websites increases organizations' risk of exposure in a third-party breach. A study conducted by researchers at Indiana University calls for more stringent password policies in which passwords…
-
"Cryptomining Malware Discovered Masquerading as Flash Updates"Hackers have taken on a sneakier approach to distributing malware for cryptocurrency-mining. According to Palo Alto Networks' Unit 42 threat research team, new strains of cryptomining malware are now being delivered via fraudulent Adobe Flash updates.…
-
"Security Researchers Find Solid Evidence Linking Industroyer to NotPetya"A link between Industroyer ICS malware that disrupted the operation of Ukraine's power grid in December 2016 and NotPetya ransomware has been discovered by ESET researchers. Evidence found by researchers suggests that the group behind the NotPetya…
-
"New Threat Group Conducts Malwareless Cyber Espionage"Symantec has discovered a cyber espionage campaign in which custom malware is not used. The new threat group behind the cyber espionage campaign, dubbed Gallmaker, makes use of publicly available hacking tools and living-off-the-land tactics to carry out…
-
"There's No Good Fix If the Supply Chain Gets Hacked"A recent report from Bloomberg alleged that China infiltrated the hardware supply chain to spy on over 30 U.S. companies including Apple and Amazon. This incident highlights the threats and challenges posed by supply chain attacks. This article continues…
-
"Researchers Uncover Security Gaps in the 5G Mobile Communication Standard"An in-depth security analysis of the 5G mobile communication standard by researchers in the Information Security Group has revealed security gaps in the new standard. Although the 5G standard is an improvement over previous standards in terms of…
-
"Cyber Researchers Propose a ‘Smart’ Social Security Card"Cybersecurity researchers at McAfee and the Center for Strategic and International Studies have suggested that government modernizes Social Security numbers as this identifier has become increasingly vulnerable to cyberattacks and being breached. A Smart…
-
"U.S. Navy Programs Shore Up Cybersecurity"Two projects called the Compile to Combat in 24 Hours and CYBERSAFE aim to bolster the U.S. Navy’s cybersecurity. Compile to Combat in 24 Hours is a project that aims to strengthen cybersecurity through data standardization, shared infrastructure,…