-
"New cybersecurity threats unwrapped"The Healthcare Information and Management Systems Society’s (HIMSS) Healthcare and Cross-Sector Cybersecurity report for the month of December, highlights cyberthreats that were recently faced by the healthcare industry. The emergence of such threats…
-
"Threat Modeling: a Critical, yet Underused, Element of Cybersecurity Risk Analysis"Threat modeling is a procedure that is often overlooked in the analysis of cybersecurity risks. The performance of threat modeling can help organizations or individuals determine the types of protection needed for their data through the identification of…
-
"Cryptojacking Has Gotten Out of Control"With the rise in cryptocurrencies has also come the rise of something a bit more dangerous: cryptojacking. Hackers use this to drain unsuspecting users of resources to make money, often causing damage to the users' devices. This article further discusses…
-
"2017: Security Was Not an Afterthought"Recent major industry breaches emphasize the importance of implementing security into the software development and software operation (DevOps) process. However, developers lack the skills to perform secure coding due to inadequate security education…
-
Cyber Scene #16 - Holiday Gift: Nothing But NetCyber Scene #16 HOLIDAY GIFT: NOTHING BUT NET The New National Security Strategy on Cybersecurity
-
"Printer-spoofing Campaign Installs Espionage-Bent Backdoors Inside the Enterprise"A small spike in attacks through the use of Canon, HP, and Epson printer and scanner email attachments has been highlighted by Barracuda Networks. Many attempts have been made by cybercriminals to launch malware attacks through spoofed emails that appear…
-
"Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet"Some models of Sonos and Bose speakers were discovered by researchers at Trend Micro to be vulnerable to attacks in which hackers could take control and play audio files. Poorly configured network settings allow these internet-connected speakers to be…
-
-
"Gaps in Software Slowing down Security Professionals"Widmeyer conducted a study in which 751 IT decision-makers, the participants of which included Asia-Pacific, UK, and the US. The results of this study brings attention to the impact that insufficient software system functions have on the productivity of…
-
"Fileless Malware Attacks Hit Milestone in 2017"According to Carbon Black’s 2017 Threat Report, there has been a significant increase in fileless malware attacks as they account for the majority of cyberattacks in 2017. Fileless malware attacks require less steps to be deployed and use native…
-
"NTU Study Says Hackers Can Use Sensors in Your Smartphone to Crack Pin"A study conducted by researchers at Nanyang Technological University, Singapore reveals that sensors within smartphones could be used by hackers to crack user PIN codes. Researchers were able to crack PIN codes on some Android smartphones through the use…
-
"Massive Leak Exposes Data on 123 Million US Households"Security researchers at UpGuard revealed that information on 123 million American households was leaked as a result of an unsecured cloud-based data repository from marketing analytics company Alteryx. The Alteryx database exposed a variety of different…
News