News
  • "Cryptojacking Has Gotten Out of Control"
    With the rise in cryptocurrencies has also come the rise of something a bit more dangerous: cryptojacking. Hackers use this to drain unsuspecting users of resources to make money, often causing damage to the users' devices. This article further discusses…
  • "2017: Security Was Not an Afterthought"
    Recent major industry breaches emphasize the importance of implementing security into the software development and software operation (DevOps) process. However, developers lack the skills to perform secure coding due to inadequate security education…
  • Cyber Scene #16 - Holiday Gift: Nothing But Net
    Cyber Scene #16 HOLIDAY GIFT: NOTHING BUT NET The New National Security Strategy on Cybersecurity
  • "Printer-spoofing Campaign Installs Espionage-Bent Backdoors Inside the Enterprise"
    A small spike in attacks through the use of Canon, HP, and Epson printer and scanner email attachments has been highlighted by Barracuda Networks. Many attempts have been made by cybercriminals to launch malware attacks through spoofed emails that appear…
  • "Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet"
    Some models of Sonos and Bose speakers were discovered by researchers at Trend Micro to be vulnerable to attacks in which hackers could take control and play audio files. Poorly configured network settings allow these internet-connected speakers to be…
  • Pub Crawl #12
     
  • "Gaps in Software Slowing down Security Professionals"
    Widmeyer conducted a study in which 751 IT decision-makers, the participants of which included Asia-Pacific, UK, and the US. The results of this study brings attention to the impact that insufficient software system functions have on the productivity of…
  • "Fileless Malware Attacks Hit Milestone in 2017"
    According to Carbon Black’s 2017 Threat Report, there has been a significant increase in fileless malware attacks as they account for the majority of cyberattacks in 2017. Fileless malware attacks require less steps to be deployed and use native…
  • "NTU Study Says Hackers Can Use Sensors in Your Smartphone to Crack Pin"
    A study conducted by researchers at Nanyang Technological University, Singapore reveals that sensors within smartphones could be used by hackers to crack user PIN codes. Researchers were able to crack PIN codes on some Android smartphones through the use…
  • "Massive Leak Exposes Data on 123 Million US Households"
    Security researchers at UpGuard revealed that information on 123 million American households was leaked as a result of an unsecured cloud-based data repository from marketing analytics company Alteryx. The Alteryx database exposed a variety of different…
  • "Proof of Randomness Builds Future of Digital Security"
    A method has been developed by researchers at Princeton University to validate the strength of random number generators that are relied upon by most encryption systems in order to generate cryptographic keys. Vulnerabilities within random number…
  • “Why Defense in Depth Must Include Secure Messaging”
    Federal, state, and local government agencies continue to experience cyber incidents at a significantly higher rate than industries within the private sector as a result of slow digital transformation. Email phishing is still the most used threat vector…