News
  • "S&T awards $8.6 million for enhancing security of mobile apps for the government"
    Five research and development (R&D) projects have been awarded funding by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T). These projects aim to strengthen the security of mobile devices and applications used by…
  • "Hackers Have Already Started to Weaponize Artificial Intelligence"
    An experiment conducted by data scientists from the security firm, ZeroFox, demonstrated the ability to train artificial intelligence (AI) to perform spear-phishing at a significantly higher rate than a human. This experiment shows that AI could be used…
  • “Hackers Can Remotely Access and Manipulate Wireless Syringe Infusion Pumps”
    Security researcher, Scott Gayou, has discovered multiple vulnerabilities within Medfusion 4000 wireless syringe infusion pumps. The wireless syringe infusion pump is a medical device used to give small doses of medication to patients. The exploitation…
  • “Threat Intelligence Collaboration on the Rise”
    According to a survey conducted by AlienVault at Black Hat USA 2017, the public sharing of cyberthreat intelligence has increased significantly as the cyberthreat landscape continues to evolve. Cybersecurity is a continuous battle as attackers develop…
  • "3 Ways AI Could Help Resolve the Cybersecurity Talent Crisis"
    In order to address the growing problem of the cybersecurity skills gap, organizations must work to cultivate security talent. As indicated by a study conducted by CompTIA in which 600 IT and business leaders were surveyed, the deficiency of…
  • “Equifax Data Breach May Affect Nearly Half the U.S. Population”
    Equifax, a leading credit-reporting firm, has faced a massive breach of data. It has been revealed that personal information including the names, Social Security numbers, birthdates, and addresses of 143 million people within the U.S. were stolen by…
  • “Protecting Systems from Rogue Root Users”
    Root users hold high-level privileges on a network, which allows them to install and manage software or hardware. System administrators within a cloud infrastructure also have root credentials to enable them to maintain operations and performance of the…
  • "Injection Attacks Common in Energy and Utilities Sector: IBM"
    According to a new report that has been released by IBM, the energy and utilities sector has faced a significantly higher increase in attacks in 2017. IBM has also observed that sixty percent of all attacks against the energy and utilities sector in 2016…
  • "Hackers send silent commands to speech recognition systems with ultrasound"
    A team of security researchers at Zhejiang University in China have a developed a method that they call “DolphinAttack”, which could be used to activate voice recognition systems with the use of high-frequency sound waves that are only detected by…
  • "Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy"
    Deception has always been a key strategy in war, politics, and commerce, but now this technique is being utilized more in the battle of cybersecurity. Cybercriminals have applied this technique through the development and launch of cyberattacks such as…
  • "Key-Logging Malware, Dubbed EHDevel, Found Intelligence Gathering"
    Security researchers have discovered complex malware that has been launched by attackers to gather intelligence, particularly targeting Indian and Pakistani individuals. This act of cyber espionage directed toward Indian and Pakistani entities has…
  • "Kansas, Missouri Collaboration Aims to Improve Regional Cybersecurity"
    In support of improving upon regional cybersecurity, agencies in Kansas and Missouri are collaborating in order to develop a strategic framework. The group leading this effort towards improving the cybersecurity of local governments is the Mid-America…