News
-
"157 GB of Highly Sensitive Data Exposed from Tesla, Toyota, Ford, GM, VW and More"A security researcher at UpGuard discovered the exposure of highly sensitive data on the web due to an unsecured backup server owned by Level One Robotics and Controls. The data breach exposed trade secrets and corporate documents of automakers…
-
"Team Suggests a Way to Protect Autonomous Grids from Potentially Crippling GPS Spoofing Attacks"The vulnerability of cyber physical systems such as energy infrastructure systems, to disruptive cyberattacks increases as the connectivity and complexity of these systems grow. A new method for the protection of the power grid from cyberattacks such as…
-
"Utilities Will Have Stricter Cybersecurity Reporting Requirements Under New Ruling"The Federal Energy Regulatory Commission (FERC) has ordered the development of new standards by the North American Electric Reliability Corporation (NERC). These standards aim to enhance the mandatory reporting of cybersecurity incidents faced by…
-
"High-Fidelity Quantum Secret Sharing Prevents Eavesdropping"Researchers have studied the level of accuracy of quantum secrets following their transmission via noisy channels. The prevention of eavesdropping on quantum secrets has also been explored by researchers. This article continues to discuss the new study…
-
“Why Artificial Intelligence is Not a Silver Bullet for Cybersecurity”Within the last few years AI research has breached the forefront of security researchers’ and companies’ minds alike. A recent survey of CISOs has show that among three different categories, 32% of CISOs rely on AI technology for their cybersecurity…
-
"IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims"Dongguan Diqee 360 vacuum cleaners have been discovered by researchers at Positive Technologies to contain vulnerabilities. These vulnerabilities could be exploited by attackers to perform malicious activities such as remotely controlling the vacuum,…
-
"New Email Malware Detection Can Outperform the Top 60 Antivirus Engines"A new method for the detection of malicious emails has been developed by researchers at the Ben-Gurion University of the Negev (BGU). The method called Email-Sec-360 is said to be stronger than 60 industry-leading antivirus engines in the detection of…
-
"Decade of Research Shows Little Improvement in Websites' Password Guidance"In order to bolster the security of personal data, popular websites should enforce password-creation guidelines during the process of setting up online accounts. Research conducted by Steven Furnell, professor of Information Security at Plymouth…
-
"Could Semantic Icons Replace Passwords and PINs?"Researchers from Xi‘an Jiaotong-Liverpool University in China have developed an alternative mobile device authentication method. The alternative authentication system called SemanticLock involves the use of a chosen sequence of graphical images.…
-
"Microprocessor Designers Realize Security Must Be a Primary Concern"The discovery of critical chip vulnerabilities known as Meltdown and Spectre has called for microprocessor designers to prioritize security. Security must be taken into consideration during the design of microprocessors as vulnerabilities contained by…
-
“One Third of Businesses Lack a Cybersecurity Expert”A recent survey conducted by research director Rob McMillan of Gartner and research analyst Sam Olyaei, titled “2018 CIO Agenda survey”, polled over 3000 CIOs across 98 different countries. The poll concluded, among other things, that only 65% of…
-
"Cryptojacking: Has Cryptocurrency-Mining Malware Already Reached Its Peak?"According to the Cybercrime Tactics and Techniques: Q2 2018 report released by Malwarebytes, there has been a decline in the launch of cryptojacking malware by hackers to infect machines and use their computing power to mine cryptocurrency. However, the…