News
-
"Seven Keys to Strengthen Your Cybersecurity Culture"In order for organizations to more effectively mitigate cybersecurity weaknesses, a culture of cybersecurity must be fostered within the workplace. Data breaches faced by companies are often the result of employee negligence, therefore further engagement…
-
"Researchers warn against 'hackable' robots"Researchers at IOActive have warned of flaws discovered within various commercially available robots, which could be exploited to allow hackers to physically harm and spy on users. Through the investigation of notable robots such as Pepper, Nao, and many…
-
"How One Energy Department Lab Uses Physics to Boost Cybersecurity"A new approach to cybersecurity has been designed by the Energy Department’s Oak Ridge National Laboratory (ORNL) to improve upon the speed and security of sharing and protecting encrypted data. This method uses quantum light particles (photons) rather…
-
"A Replacement Screen Could Offer Hackers A Key To Your Smartphone"According to a new study conducted by researchers at Ben-Gurion University, third-party smartphone replacement parts may consist of maliciously programmed chips, which could be used to hack smartphones in order to perform malicious activities and steal…
-
"Defeating cyberattacks on 3-D printers"3D printers are expected to become more attractive targets of cyberattacks as this technology is now being utilized to print objects and parts used in critical infrastructure. The launch of cyberattacks targeting 3D printers may significantly impact…
-
"How to improve IoT security"Security challenges arise as the use of Internet of Things (IoT) continues to grow. Devices connected to the internet can pose risks to the safety, security, and privacy of users. A recent meta-study titled, “The Internet of Hackable Things”, in which…
-
“NIST Advocates Use of Longer Passwords to Improve Security”The U.S. National Institute for Standards and Technology (NIST) has updated its guidelines in support of increasing the complexity of passwords through the creation of longer passwords. According to NIST Special Publication 800-33B titled, “Digital…
-
"Microsoft PowerPoint exploit used to bypass antivirus and spread malware"Researchers at Trend Micro have discovered a cyberattack in which a vulnerability is being exploited by attackers to circumvent antivirus software and distribute Trojan malware via Microsoft PowerPoint files. The vulnerability being exploited to deliver…
-
"A Deep Flaw in Your Car Lets Hackers Shut Down Safety"In 2015, researchers performed a demonstration in which they hijacked a moving Jeep to manipulate its driving functions such as steering, accelerating, and breaking. Ever since this discovery, the auto industry has made attempts at preventing the hacking…
-
"Medical devices and the Internet of Things: Defending against cyber threats"Deloitte surveyed professionals within the Internet of Things-connected medical device ecosystem, revealing what they think is the biggest challenge facing the medical industry in relation to cybersecurity. According to respondents, the…
-
"Hackers See Privileged Accounts as Best Route to Sensitive Data"A survey conducted by Thycotic at the Black Hat 2017 conference reveals the perspectives of hackers on the protection of critical data. According to the survey, hacking privileged accounts is the pathway that is most preferred by hackers to gain quick…