News
-
“Meltdown-Spectre flaws: We’ve found new attack variants, say researchers”In a new report from Nvidia and Princeton, researchers from both organizations have discovered new variants of Meltdown and Spectre, dubbed “MeltdownPrime” and SpectrePrime”. MeltdownPrime and SpectrePrime have a similar accuracy to their original…
-
“Crowdsourcing Cyber Threat Defense”418 Intelligence Corporation, a cybersecurity company based in Herndon, VA, was awarded $350,000 by the Department of Homeland Security in support of developing a game-based cybersecurity forecasting system. The platform will be used by organizations to…
-
"To Prevent Cyberattacks, Agency Similar to National Transportation Safety Board Suggested"Indiana University research recommends the establishment of a National Cybersecurity Safety Board similar to the National Transportation Safety Board in regards to its approach to investigation. Researchers have emphasized the need to create an…
-
“Energy-Efficient Encryption for the Internet of Things”MIT researchers have developed a new chip to efficiently execute public-key encryption protocols for IoT devices. The chip performs public-key encryption with significantly faster execution, and consumes less power and memory than the software used to…
-
"Tackling the insider threat: Where to start?"Global security strategist at Absolute, Richard Henderson, emphasizes the importance of mitigating insider threats as several major breaches of data have been found to be caused by insiders. Insiders pose a significant threat to the security of…
-
"Security Shortage Forces CISOs to Increase Reliance on Machine Learning"F5 Labs and Ponemon conducted a survey to which CISOs from many different enterprises responded. The results of the survey indicate that CISOs are relying more on machine learning to help perform IT security functions due to the significant shortage of…
-
"UDPoS PoS Malware Exfiltrates Credit Card Data DNS Queries"Researchers at ForcePoint Labs have discovered a new point-of-sale (PoS) malware called UDPoS that uses User Datagram Protocol (UDP) DNS traffic to steal credit card information. The malware is distributed under the guise of an update from a remote…
-
“Winter Olympics Cyberattack Designed to Cause Chaos”The PyeongChang Winter Olympics recently faced a cyberattack that disrupted internal servers and public Wi-Fi. According to Cisco’s Talos Intelligence Group, the motive behind the cyberattack was to cause disruption and not to infiltrate official…
-
"US, International Law Enforcement Shut Down Massive Cybercrime Marketplace"The Infraud Organization was taken down by US law enforcement authorities as the global cybercrime group has been found to be behind the loss of over $500 million within the last seven years. 36 individuals have been charged for their alleged positions…
-
“Forging a Quantum Leap in Quantum Communication”A new method has been developed by researchers at Bar-llan University to improve the speed at which data is transferred in quantum communication. The method developed by researchers replaces the electrical nonlinearity of the standard data processing…
-
"Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets"Director of Cybersecurity Research Center Mordechai Guri and his team of researchers at Israel's Ben-Gurion University have demonstrated methods that could be used to exfiltrate data from air-gapped systems. The methods demonstrated by researchers…
-
“What is Cryptojacking and Why Is It a Cybersecurity Risk?”Cryptojacking attacks have been on the rise due to the growing popularity and value of cryptocurrency. The performance of unauthorized cryptocurrency mining is known as cryptojacking. This article continues to discuss the concept and process of…