News
-
"The Challenge of Authenticating Real Humans in a Digital World"Authentication is a major part of our everyday lives as we use various forms of identification such as driver’s licenses, ID cards, passwords, passcodes, and more to prove our identities offline and online. Although the process of authentication is…
-
“Experts Find Faster Way to Exploit Infineon Chip Crypto Flaw”Over the weekend, two researchers by the names of Daniel J. Bernstein and Tanja Lange were able to reproduce an attack that exploited a known flaw in Infineon Technologies RSA chips called CVE-2017-15361, also know as ROCA (Return of the Coppersmith…
-
“Extortion-Based Cyber Attacks: the Next Evolution in Profit-Motivated Attack Strategies”Cyberattacks are expected to become significantly more devastating for companies in the coming year. As companies are increasingly taking action to defend against cyberattacks, attackers are expected to take on more volatile methods of launching…
-
"Shape Security Introduces BlackFish AI to Combat Credential Stuffing"Shape Security has recently released its BlackFish AI technology aimed at helping organizations detect credential stuffing attacks. Attackers perform credential stuffing by using stolen account credentials derived from data breaches to access…
-
"Researchers Unveil Tool to Debug 'Black Box' Deep Learning Algorithms"Self-driving cars operate through the use of deep learning systems. Deep learning is a form of machine learning that uses layers of artificial neurons in an attempt to mimic the processing and merging of information performed by the human brain. Although…
-
"Many Brother Printers Vulnerable to Remote DoS Attacks"Researchers at Trustwave have warned of an unpatched vulnerability that would allow attackers to remotely disable Brother printers temporarily with the generation of DoS attacks. The vulnerability arises from an embedded HTTP Daemon (HTTPd) server by the…
-
"A 'Virtual Wall' That Improves Wireless Security and Performance"A team of researchers led by Dartmouth College has proposed a solution to improving upon wireless security and performance. The solution utilizes 3-D printing technology to develop a reflector, which can be used to direct wireless signals to areas where…
-
“When Ransomware Strikes: 7 Steps You Can Take Now to Prepare”When it comes to ransomware attacks, even the most prepared company can become a victim. Before an incident occurs, an emergency plan must be in place to ensure that a company can prevent as little damage to itself and its customers as possible. This…
-
"Five Fundamental Strategies for Cybersecurity"The Report on Securing and Growing the Digital Economy, released by the Commission on Enhancing National Cybersecurity, provides recommendations for improving upon cybersecurity within the private and public sectors as well as emphasizes the insufficient…
-
Cybersecurity Insurance Succeed where Regulations Fail?Interesting article about Richard A. Clarke view on cybersecurity insurance. There are a few key points that he makes that are worth pondering. I added some of my thoughts to it. There is a forum section of the vo if you like engage on the topic.
-
"New Bill Would Transform Cybersecurity at Dept. of Health and Human Services"In support of improving upon cybersecurity practices at the Department of Health and Human Services (HHS), the HHS Cybersecurity Modernization Act has been reintroduced by U.S. Representatives Billy Long (R-Missouri) and Doris Matsui (D-California…
-
"Android Security Triple-Whammy: New Attack Combines Phishing, Malware, and Data Theft"Researchers at Proofpoint have discovered a single campaign targeting Android devices that has combined the tactics of credential phishing, credit card data theft, and malware in order to gather sensitive banking infromation from financial services and…