News
-
“Cyberspace Triggers a New Kind of Arms Race”The cyber arms race is intensifying as automated cyber weapons become more advanced for the launch of devastating cyberattacks. The increased circulation and investment of cyber weapons among cybercriminals and malicious nation-states have triggered the…
-
"Why Developing an Internal Cybersecurity Culture Is Essential for Organizations"The European Network and Information Security Agency (ENISA) released a report focused on the development of cybersecurity culture in organizations. The report provides tools and guidance to introduce or improve upon cybersecurity culture within…
-
"Covert Data Channel in TLS Dodges Network Perimeter Protection"A new method has been identified by security researchers at Fidelis Cybersecurity that could be used by attackers to covertly exchange data during TLS negotiation and circumvent network perimeter defenses. This technique is performed through the…
-
"Record-Breaking Efficiency for Secure Quantum Memory Storage"An advancement in quantum memory performance has been made by researchers at Laboratoire Kastler Brossel on which the efficiency of optical qubit storage has been improved. This improvement in quantum memory indicates that quantum bits can be securely…
-
"Threats to Industrial Control Systems Grow as Vulnerabilities Increase"According to a research report released by Positive Technologies, the number of vulnerable industrial control devices is growing each year. The poor security of such devices significantly increases the possibility of network infiltration by…
-
"Majority of Health Apps Plagued with Security Risks, Say Researchers"A study conducted by researchers at the University of Pireus in Greece and Rovia I Virgili University in Spain, indicates that the majority of health apps contain security flaws. The inadequate security of such apps pose a threat to the privacy of users…
-
"6 Use Cases for Blockchain in Security"Blockchain technology has attracted much attention from leaders across different industries as the technology has the potential to improve upon cybersecurity in many ways. The methods of blockchain technology could be applied to improve authentication…
-
"In Just 24 Hours, 5,000 Android Devices Are Conscripted into Mining Botnet"A new botnet has been recently discovered by security researchers at Netlab to have already infected more than 5,000 Android devices with worm-like malware. The malware behind the botnet causes the infected devices to mine Monero cryptocurrency.…
-
"New Cybersecurity Course Teaches Teens the ABCs of (Ethical) Hacking"A new cybersecurity course will be offered to high school students by CodeHS, which is a teaching platform for coding courses. The course will be geared towards offering students hands-on learning of aspects within cybersecurity such as vulnerabilities,…
-
"Government Backs National Cyber Policy and Strategy Competition"The Atlantic Council has announced that the UK will be hosting the Cyber 9/12 Student Challenge in February 2018. This challenge is a cyber policy and strategy competition in which university students from all academic disciplines are given the…
-
"Just 20% of Orgs Have Breach Notification Plans"Tripwire conducted a survey to which 406 cybersecurity professionals responded. According to the results of the survey, an overwhelming majority of organizations that will be affected by the European Union’s General Data Protection Regulation (GDPR) have…
-
"Georgia Bill Poses Potential Threat to Cybersecurity Researchers"The Senate Bill 315 introduced to the Georgia General Assembly by State Sen. Bruce Thompson is raising major concerns among cybersecurity researchers due to its unclear language. The aim of the bill is to criminalize unauthorized computer access in the…