News
-
“How Attackers Can Take Advantage of Encrypted Tunnels”As indicated by a survey conducted by Venafi, many organizations often neglect to examine encrypted traffic within their networks. As the encryption of traffic by organizations as well as the use of machine identities increases, the risk of…
-
"Strengthening the Cybersecurity of the Grid"The enhanced connectivity that accompanies the continued modernization of the U.S. electricity grid ignites concerns as advancements in computing and communications technologies for grid operators and consumers are expected to increase the possibility of…
-
"Major Strain of Mac Ransomware Discovered"Researchers at Duo Security have discovered a new strain of ransomware, which targets Mac users as it attacks the firmware of Apple Mac computers. Analyses of 73,000 Mac computer systems have revealed the lack of security updates being received by the…
-
"Phishers Use Private Banking Messages to Lure Victims"This article contains information about a phishing campaign spotted by security vendor Barracuda Networks that uses a variety of legitimate looking emails to impersonate banks such as Bank of America and TD Commercial Banking. Briefly highlighted is the…
-
"Mobile Stock Trading Apps Riddled with Security Holes"Senior security consultant at IOActive, Alejandro Hernandez, has discovered a number of vulnerabilities during the examination of 21 popular mobile stock trading applications. The exploitation of these vulnerabilities can allow hackers to perform…
-
“Facebook-Hijacking Faceliker Malware Is on the Rise”Researchers have observed a significant increase in the activity of Faceliker, which is a strain of Trojan malware that performs a click fraud scheme via the manipulation of users’ Facebook accounts. Though Faceliker has been active since 2013, there has…
-
"Training Machine Learning for Cyberthreats"As the cyberthreat landscape continues to grow in complexity, traditional security measures such as firewalls and antivirus software are becoming highly insufficient in the fight against sophisticated cyberattacks that are being launched today.…
-
“Volumetric Attacks and the IoT Dominate DDoS Scene”Nexusgaurd’s Q2 2017 Threat Report has revealed that an overwhelming majority of distributed denial of service (DDoS) attacks that have been launched during the second quarter of 2017 were blended, multi-vector attacks. The report has also revealed that…
-
“NSA Invites Students to 'Hack Us!’”Registration is now open for the 2017 Codebreaker Challenge, which is a contest developed by the National Security Administration (NSA) in support of developing the cybersecurity skills of university students. This contest invites college students to…
-
“Computer Scientists Address Gap in Messaging Privacy”A team of researchers have developed a new protocol that would improve upon end-to-end encryption to protect against the interference of messages by attackers. This protocol forces evidence to be left behind in the event that communications between a…
-
“More ATM Network Attacks Expected, US and Canada to Be Targeted”Bank ATM networks within the United States and Canada are expected to face an influx of cyberattacks in 2017 according to a report published by Europol’s European Cybercrime Centre (EC3) and Trend Micro. This report provides details on a variety of…
-
“Researchers Find Vulnerability in Smart Home Control Apps”Researchers at Rapid7 have discovered that Android applications used to control smart home hubs, Wink Hub 2 and Instead Hub, store sensitive information within configuration files in plaintext form. This sensitive information includes access credentials…