News
  • "Poor Password Policy? New Study Probes Prevalent Protection Problems"
    Dashlane, a password management service, conducted a new study that reveals the quality of password policies implemented by popular web services such as Amazon, Dropbox, QuickBooks, and more. The study conducted, analyzed 40 popular online portals using…
  • "New Consortium Promotes Proper Data Sanitization Practices"
    The International Data Sanitization Consortium (IDSC) has been developed by a group of security experts to provide guidance in the process of properly sanitizing data on hardware devices such as hard drives within data centers, medical equipment,…
  • "How to protect personally identifiable information under GDPR"
    Enforcement of the European Union’s General Data Protection Regulation (GDPR) officially begins on May 25, 2018. The GDPR will have a far-reaching impact as any company that conducts business with EU citizens will be expected to comply with this…
  • "Fuzz testing finds industries left vulnerable by unsecured software"
    The Synopsys’ State of Fuzzing 2017 report reveals that open source protocols and common file formats used within six different industries, likely contain zero day exploits.  The report derives from more than 4.8 billion fuzz tests performed by…
  • "Fighting cyberattacks with volunteers"
    The Michigan Cyber Civilian Corps, MiC3, contains highly skilled volunteers from the public and private sector who are willing to provide assistance in the event that the state is targeted by a major cyberattack. However, the MiC3 has not yet been…
  • "Hackers use 'cloud-on-cloud' attacks to evade detection, attribution"
    Researchers at Skyhigh Networks have discovered attacks targeting Microsoft Office 365 accounts of senior employees within a wide range of Fortune 2000 companies. These attacks have been launched through the use of cloud infrastructure to perform…
  • "USB connections make snooping easy"
    Researchers at the University of Adelaide reveal that USB connections are more insecure than previously thought as they have discovered that this common interface is vulnerable to information leakage. Over 90% of the large variety of computers and…
  • "Scientists Hack a Computer Using DNA"
    Scientists at the University of Washington in Seattle have developed the first biological malware that is capable of successfully taking over a computer. Researchers were able to demonstrate this hack by encoding malicious software into DNA then using it…
  • "Cyber-Attack on Solar Panels Could Shut Down Power Grids via Domino Effect"
    New research by Dutch security engineer, Willem Westerhof, reveals the presence of vulnerabilities within photovoltaic panels, which could have an extensive impact on a country’s power grids. Westerhof claims that the vulnerabilities of photovoltaic…
  • "How a port misconfiguration exposed critical infrastructure data"
    UpGaurd researchers have discovered an open port in which hackers could use to exfiltrate data from the servers of Power Quality Engineering (PQE), a Texas-based firm. The discovery was made as Chris Vickery, UpGaurd Director of Cyber Risk Research, was…
  • "REnigma malware reverse-engineering tool commercialized"
    DHS S&T has announced the transition of an innovative malware analysis tool by the name of “REnigma”, into the marketplace as a new startup technology company.  The transition of this technology into a commercially available product is supported…
  • "Researchers Add Profile-Based Anomaly Detection to SIEM"
    Researchers at Germany’s Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) have added profile-based anomaly detection software for security information and event management (SIEM) systems to help in the management of…