News
-
“Recycled Electronic Waste Adds to Cybersecurity Concerns”Improper disposal or destruction of recycled hardware devices raises cybersecurity concerns as such devices could still contain sensitive data that could be extracted by anyone. Electronic waste derives from inevitable device updates that are carried out…
-
"Fitness Trackers Could Benefit from Better Security, Study Finds"A team of researchers at the University of Edinburgh discovered a method, which hackers could use to interreupt messages in their transmission between fitness trackers and cloud servers. In the demonstration of this method, researchers were able to…
-
"Bluetooth BlueBorne Flaws Expose Billions of Devices to Security Risks"IoT security firm, Armis, discovered and properly disclosed eight security vulnerabilities within stacks on Bluetooth devices, which could allow hackers to assume control over the device and infect other devices with malware. The set of…
-
"S&T awards $8.6 million for enhancing security of mobile apps for the government"Five research and development (R&D) projects have been awarded funding by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T). These projects aim to strengthen the security of mobile devices and applications used by…
-
"Hackers Have Already Started to Weaponize Artificial Intelligence"An experiment conducted by data scientists from the security firm, ZeroFox, demonstrated the ability to train artificial intelligence (AI) to perform spear-phishing at a significantly higher rate than a human. This experiment shows that AI could be used…
-
“Hackers Can Remotely Access and Manipulate Wireless Syringe Infusion Pumps”Security researcher, Scott Gayou, has discovered multiple vulnerabilities within Medfusion 4000 wireless syringe infusion pumps. The wireless syringe infusion pump is a medical device used to give small doses of medication to patients. The exploitation…
-
“Threat Intelligence Collaboration on the Rise”According to a survey conducted by AlienVault at Black Hat USA 2017, the public sharing of cyberthreat intelligence has increased significantly as the cyberthreat landscape continues to evolve. Cybersecurity is a continuous battle as attackers develop…
-
"3 Ways AI Could Help Resolve the Cybersecurity Talent Crisis"In order to address the growing problem of the cybersecurity skills gap, organizations must work to cultivate security talent. As indicated by a study conducted by CompTIA in which 600 IT and business leaders were surveyed, the deficiency of…
-
“Equifax Data Breach May Affect Nearly Half the U.S. Population”Equifax, a leading credit-reporting firm, has faced a massive breach of data. It has been revealed that personal information including the names, Social Security numbers, birthdates, and addresses of 143 million people within the U.S. were stolen by…
-
“Protecting Systems from Rogue Root Users”Root users hold high-level privileges on a network, which allows them to install and manage software or hardware. System administrators within a cloud infrastructure also have root credentials to enable them to maintain operations and performance of the…
-
"Injection Attacks Common in Energy and Utilities Sector: IBM"According to a new report that has been released by IBM, the energy and utilities sector has faced a significantly higher increase in attacks in 2017. IBM has also observed that sixty percent of all attacks against the energy and utilities sector in 2016…