News
-
"Tesla Model S Key Fobs Were Vulnerable to a Low-Tech Hack"Researchers from KU Leuven university in Belgium have uncovered a security vulnerability contained the Tesla Model S. This vulnerability could allow adversaries to create a duplicate of the car's key fob in order to unlock the vehicle and drive off with…
-
"Modular Malware Brings Stealthy Attacks to Former Soviet States"Recent discoveries by researchers have brought further attention to the use of modular malware downloaders by attackers. Two new modular downloaders have been discovered by researchers at Proofpoint. This article continues to discuss the new modular…
-
"New Security Research Reveals Password Inadequacy Still a Top Threat"One of the findings shared in WatchGuard’s Internet Security Report for Q2 2018 suggests that weak password creation remains a top threat to security. The finding calls for an increase in the implementation of multi-factor authentication (MFA) solutions…
-
"Computer Security Researchers: WPA3 Could Have Been Better, Stronger"Simultaneous Authentication of Equals (SAE) is a security enhancement provided by WPA3 that aims to prevent attacks such as the WPA2 KRACK attack discovered in 2016. The KRACK attack interferes with the four-way handshake method of the WPA2 protocol.…
-
"Personal Cyber Insurance Added to Homeowner Policy"Saga is an insurance provider that has recently announced the launch of personal cybercrime insurance. The Personal Cybercrime coverage will provide protection to individuals from cyber risks on their personal devices. This article continues to discuss…
-
"First IoT Security Bill Reaches Governor's Desk in California"California’s SB-327 is an Internet of Things (IoT) security bill that has now been approved and sent to Gov. Jerry Brown’s desk to be signed. The Internet of Things Cybersecurity Improvement Act of 2017 was introduced in February 2017 and aims to improve…
-
"What Can We Do to Reverse the Cybersecurity Skills Shortage?"Bharat Mistry, Principal Security Strategist at Trend Micro, further discusses the issue of the cybersecurity skills shortage. The shortage must be addressed as cyber threats faced by governments and businesses continue to grow in frequency and…
-
"Tesla’s New Bug Bounty Protects Hackers — and Your Warranty"Tesla’s updated product security policy has declared that it will allow car owners to hack their own cars as long as they follow the rules of the company’s bug bounty program. The change is significant to security researchers as they will be…
-
"One of Most Popular Mac Apps Acts Like Spyware"A top-selling Mac app, called Adware Doctor, has been discovered by security researchers to be performing spyware activities. According to researchers, the app has been collecting data pertaining to its users and sending that data to a server in…
-
Game-theoretic Paper Wins Annual Paper CompetitionThe winner of the 6th Annual Best Scientific Cybersecurity Paper Competition is How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games by Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David…
-
"Army Research Takes Proactive Approach to Defending Computer Systems"There has been an advancement in the development of moving target defense (MTD) techniques for defending computer systems against cyberattacks by a team of researchers from the U.S. Army Research Laboratory, University of Canterbury in New Zealand, and…
-
"7 Ways Blockchain is Being Used for Security"Blockchain technology can be used as a tool to enhance security in a number of ways. The security of critical infrastructure, data, and more, can be improved through the use of blockchain technology. This article continues to discuss the growing…