News
  • "Hijacking Computers to Mine Cryptocurrency Is All the Rage"
    Security researchers have observed a significant increase in the launch of cyberattacks with the purpose of hijacking computers to perform the computationally demanding process that is mining cryptocurrency. Recently, a cryptocurrency mining tool…
  • "Hundreds of Printers Expose Backend Panels and Password Reset Functions Online"
    Ankit Anubhav, Principal Researcher at NewSky Security, has discovered that around 700 Brother printers have been left exposed as attackers can access the administration panels of these printers via the Internet. The absence of an administrator password…
  • "ONR Awards GrammaTech $9 Million for Cyber-Hardening Security Research"
    The Office of Naval Research (ONR) has awarded GrammaTech, Inc. with a $9 million, three-year contract in support of protecting software from cyberattacks through the research and development of advanced methods. With this funding, GrammaTech will…
  • "New Data Structure Allows Rapid Tracking and Policing of Network Data"
    A team of A*STAR researchers have developed a new data structure by the name of REX, which stands for Resilient and Efficient Data Structure. This new data structure improves upon the commonly-used data structure, hash table, to defend networks from…
  • "Accenture: Utility Grids Brace for Cyberattacks—with Poor Defenses"
    A report has been released by Accenture, titled “Outsmarting Grid Security Threats”, that shares the results of a survey in which 100 utility executives from around the world responded to. The results of this survey indicate that many countries are…
  • "66 Percent of SMBs Say a Cyber Attack Would Shut Them Down"
    A recent survey conducted by VIPRE Security indicates that many small and midsize businesses (SMBs) would temporarily or permanently cease operations due to a lack of adequate security practices. The survey reveals the insufficiency of security practices…
  • "Spear-Phishers Hijack In-Progress Conversation in Highly-Targeted Attack"
    Security researchers at Palo Alto have discovered a spear-phishing campaign in which a bank based in the Middle East, an international sporting organization, certain individuals with ties to a Northeast Asian country, as well as Europe-based trademark…
  • "Four Ways to Empower Your Employees through Security Awareness Training"
    For IT professionals, creating and implementing a flawless cybersecurity plan is the ideal situation. However, due to lack of resources, companies focus more on implementing sound processes and policies rather than the human error of their employees.…
  • “Cyber Risks Loom for Energy Sector”
    Cyberattacks pose the greatest threat to the U.S. energy sector as indicated by an upcoming Energy Department report in which the relative hazards and impacts of natural disasters and cyberattacks are compared. The U.S. has been urged by the White House…
  • "Cloud Vulnerabilities Are Being Ignored by the Enterprise"
    An annual report on cloud security has been released by RedLock, which indicates that security practices pertaining to the use of cloud services are still being overlooked by many organizations. According to the report, many organizations that use …
  • “Mini Crypto Chip Is a Self-Contained Encryption Engine”
    The Mini Crypto Chip is an independent encryption engine used by the Air Force to protect communications and sensitive data transmitted between systems from the interception of adversaries. Mini Crypto has been designed to be physically small and easy to…
  • “Google Reveals Critical Flaws In Dnsmasq Software Packages”
    Google security researchers have discovered seven different critical security vulnerabilities within the Dnsmasq software package, which largely impacts millions of Android phones, home routers, desktops, and other IoT devices. Dnsmasq is an open-source…