-
"Automation and Gamification Key to Cyber Security"A survey conducted by McAfee indicates that the use of automation and gamification are essential to cybersecurity. As IT security teams continue to face challenges in relation to the growing cyberthreat landscape, cybersecurity talent gap, and retention…
-
"Baltimore's 911 Dispatch Hacked, CAD System down for 17 Hours"Baltimore's 911 system recently faced an attack, which took down its computer-aided dispatch (CAD) system for 17 hours. The attack significantly impacted efficiency as details pertaining to incoming callers had to be relayed to dispatchers manually…
-
"Fileless Crypto-Mining Malware Discovered"Security researchers from Minerva Lab discovered malware called GhostMiner that performs illicit cryptomining of Monero. The malware applies a fileless infection method to hide its code in order to circumvent detection by security tools. This article…
-
"Improve Your Information Security by Giving Employees More Options"According to a recent study, employees are more likely to improve upon their security behavior when provided with engaging security messages that allow them to choose how they can enhance the security of information and respond to threats in the…
-
"Outdated Cyber Defence Puts Organisations At Risk, Says Webroot"Webroot’s 2018 Annual Threat Report emphasizes the need for organizations to update their cyber defenses as the cyber threat landscape continues to expand and grow in complexity. Organizations are encouraged to implement multi-layered security, make use…
-
"TLS 1.3 Encryption Standard Moves Forward, Improving Internet Security"Transport Layer Security (TLS) 1.3 has been approved by the Internet Engineering Task Force to be the new standard for internet security. TLS 1.3 will improve upon the security and speed of connections over the internet. This article continues to discuss…
-
"New Ransomware Attacks Endpoint Defenses"Researchers have discovered a new variant of ransomware that attempts to disable anti-virus packages, Windows Defender and Malwarebytes, in order to circumvent detection and removal. The ransomware, dubbed AVCrypt, tries to disable Windows Defender and…
-
"Cyber Actors Using 'Password Spraying' Against Organisations' Email Systems"The U.S. Department of Homeland Security and FBI has warned of the use of a technique called password spraying to infiltrate the systems of American and foreign companies. Password spraying is a brute force attack method discovered to be used by a…
-
"As Predicted, More Branch Prediction Processor Attacks Are Discovered"A new branch prediction processor attack has been revealed by researchers from the College of William and Mary, Carnegie Mellon, the University of California Riverside, and Binghamton University. The new attack dubbed BranchScope is similar to the second…
-
"Cyber-Terrorism Set to Be Top Threat by 2020"Information Security Forum’s (ISF) annual Threat Horizon report suggests that nation-state-led cyber terrorism will become a greater threat to organizations by 2020. According to the Threat Horizon 2020 report, critical national infrastructure will…
-
"NIST Targets APTs with Resilience Strategies"The National Institute of Standards and Technology (NIST) has released a new draft publication called Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. The latest draft publication guides…
-
"Brain-Like Computers Moving Closer to Cracking Codes"U.S. Army Research Laboratory scientists have demonstrated the use of neuromorphic computers to increase the speed of factoring large composite integers, which challenge the security of the RSA algorithm. Neuromorphic computers are brain-like computers…
News