News
-
"A Third of the Internet Is Under DoS Attack"Researchers from the Center for Applied Internet Data Analysis, based at the San Diego Supercomputer Center, UC San Diego, have conducted an extensive study in which they revealed that one-third of the IPv4 address space was susceptible to some form of…
-
"Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening"Injection attacks continue to be a top threat to organizational networks as indicated by an analysis conducted by IBM X-Force of IBM Managed Security Services (MSS) data. The analysis conducted from January 2016 to June 2017, reveals that injection…
-
"How Wireless Intruders Can Bypass NAC Controls"According to Gabriel Ryan, a security engineer at Gotham Digital Science, the utilization of port-based network access control (NAC) devices is still insufficient in protecting an organization’s wireless network if EAP-TLS wireless security is not…
-
"Researchers Analyze 3,200 Unique Phishing Kits"Though actions against most phishing sites are quickly executed once they are detected, the impact of such malicious sites could still be extensive enough to satisfy the phisher in the short length of time that they are active. Attackers often exert very…
-
"Hackers Abusing Digital Certs Smuggle Malware past Security Scanners"According to security researchers at the University of Maryland, hackers are using compromised digital code-signing certificates to sign malware in order to circumvent system security measures established for signature checking. This tactic is…
-
"Password May Be Stored in Your Shirt Cuff"Researchers at the University of Washington are working to improve upon smart fabrics with the use of magnetized textiles to store small amounts of data. The data stored on magnetized textiles can be read by a magnetometer, which could allow users to…
-
"'Combosquatting' Attack Hides in Plain Sight to Trick Computer Users"According to a study conducted by researchers from Georgia Tech and Stony Brook University, “combosquatting” is an attack strategy that is increasingly being used by attackers to trick unsuspecting users into clicking malicious sites with URLs that…
-
"'Instant Replay' for Computer Systems Shows Cyber Attack Details"Cybersecurity researchers at the Georgia Institute of Technology are developing a new software system called Refinable Attack Investigation (RAIN). This new system will significantly improve upon the examination of the extent and impact of network or…
-
Cyber Scene #14 - Trick or Treat?Cyber Scene #14 Trick or Treat? OLD HAUNTS China: 1,000 cyber flowers
-
"This New Kind of AI Can Breach Anti-Bot Security by Thinking Like a Human"With the use of a new type of neural network by the name of Recursive Cortical Network (RCN), the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) can now be defeated. CAPTCHA is a security system that is widely used…