-
"US, International Law Enforcement Shut Down Massive Cybercrime Marketplace"The Infraud Organization was taken down by US law enforcement authorities as the global cybercrime group has been found to be behind the loss of over $500 million within the last seven years. 36 individuals have been charged for their alleged positions…
-
“Forging a Quantum Leap in Quantum Communication”A new method has been developed by researchers at Bar-llan University to improve the speed at which data is transferred in quantum communication. The method developed by researchers replaces the electrical nonlinearity of the standard data processing…
-
"Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets"Director of Cybersecurity Research Center Mordechai Guri and his team of researchers at Israel's Ben-Gurion University have demonstrated methods that could be used to exfiltrate data from air-gapped systems. The methods demonstrated by researchers…
-
“What is Cryptojacking and Why Is It a Cybersecurity Risk?”Cryptojacking attacks have been on the rise due to the growing popularity and value of cryptocurrency. The performance of unauthorized cryptocurrency mining is known as cryptojacking. This article continues to discuss the concept and process of…
-
“Cyberspace Triggers a New Kind of Arms Race”The cyber arms race is intensifying as automated cyber weapons become more advanced for the launch of devastating cyberattacks. The increased circulation and investment of cyber weapons among cybercriminals and malicious nation-states have triggered the…
-
"Why Developing an Internal Cybersecurity Culture Is Essential for Organizations"The European Network and Information Security Agency (ENISA) released a report focused on the development of cybersecurity culture in organizations. The report provides tools and guidance to introduce or improve upon cybersecurity culture within…
-
"Covert Data Channel in TLS Dodges Network Perimeter Protection"A new method has been identified by security researchers at Fidelis Cybersecurity that could be used by attackers to covertly exchange data during TLS negotiation and circumvent network perimeter defenses. This technique is performed through the…
-
"Record-Breaking Efficiency for Secure Quantum Memory Storage"An advancement in quantum memory performance has been made by researchers at Laboratoire Kastler Brossel on which the efficiency of optical qubit storage has been improved. This improvement in quantum memory indicates that quantum bits can be securely…
-
"Threats to Industrial Control Systems Grow as Vulnerabilities Increase"According to a research report released by Positive Technologies, the number of vulnerable industrial control devices is growing each year. The poor security of such devices significantly increases the possibility of network infiltration by…
-
"Majority of Health Apps Plagued with Security Risks, Say Researchers"A study conducted by researchers at the University of Pireus in Greece and Rovia I Virgili University in Spain, indicates that the majority of health apps contain security flaws. The inadequate security of such apps pose a threat to the privacy of users…
-
"6 Use Cases for Blockchain in Security"Blockchain technology has attracted much attention from leaders across different industries as the technology has the potential to improve upon cybersecurity in many ways. The methods of blockchain technology could be applied to improve authentication…
-
"In Just 24 Hours, 5,000 Android Devices Are Conscripted into Mining Botnet"A new botnet has been recently discovered by security researchers at Netlab to have already infected more than 5,000 Android devices with worm-like malware. The malware behind the botnet causes the infected devices to mine Monero cryptocurrency.…
News