News
-
"Training Machine Learning for Cyberthreats"As the cyberthreat landscape continues to grow in complexity, traditional security measures such as firewalls and antivirus software are becoming highly insufficient in the fight against sophisticated cyberattacks that are being launched today.…
-
“Volumetric Attacks and the IoT Dominate DDoS Scene”Nexusgaurd’s Q2 2017 Threat Report has revealed that an overwhelming majority of distributed denial of service (DDoS) attacks that have been launched during the second quarter of 2017 were blended, multi-vector attacks. The report has also revealed that…
-
“NSA Invites Students to 'Hack Us!’”Registration is now open for the 2017 Codebreaker Challenge, which is a contest developed by the National Security Administration (NSA) in support of developing the cybersecurity skills of university students. This contest invites college students to…
-
“Computer Scientists Address Gap in Messaging Privacy”A team of researchers have developed a new protocol that would improve upon end-to-end encryption to protect against the interference of messages by attackers. This protocol forces evidence to be left behind in the event that communications between a…
-
“More ATM Network Attacks Expected, US and Canada to Be Targeted”Bank ATM networks within the United States and Canada are expected to face an influx of cyberattacks in 2017 according to a report published by Europol’s European Cybercrime Centre (EC3) and Trend Micro. This report provides details on a variety of…
-
“Researchers Find Vulnerability in Smart Home Control Apps”Researchers at Rapid7 have discovered that Android applications used to control smart home hubs, Wink Hub 2 and Instead Hub, store sensitive information within configuration files in plaintext form. This sensitive information includes access credentials…
-
“Researchers Investigate Heart Scan for Computer Security Identification”A team of researchers at the University at Buffalo have developed a computer security system in which biometric scanning is performed on the dimensions of a person’s heart for identification. This new form of biometric identification measures and…
-
“1.4 Million Phishing Sites Are Created Monthly”A new report released by Webroot reveals that an alarming amount of phishing sites are being created each month. As indicated by data collected by Webroot, an average of 1.385 million phishing sites are being developed by hackers every month. These…
-
“Setting the Standard for a Blockchain Protocol for IoT”The Trusted IoT Alliance has been formed among blockchain technology companies and enterprises such as Cisco, Gemalto, and Bosch. This alliance is in support of the development and establishment of a standard to be followed by an open source blockchain…
-
“Compliance and Data Privacy Regs IT Security Pros Should Worry About”As the official enforcement of the EU’s General Data Protection Regulation (GDPR) approaches, concerns of IT security professionals pertaining to challenges in regulatory compliance and data privacy have been heightened. Organizations are expected to…