News
-
"New mobile banking Trojans"The latest modification of the notorious mobile banking malware family by the name of “Svpeng” – Trojan-Banker.AndroidOS.Svpeng.ae adds on new keylogger functionality that could allow cybercriminals to steal entered text by abusing accessibility services…
-
"The Justice Department wants to help you run a vulnerability disclosure program"The U.S. Department of Justice has released guidelines to help those that are interested in legally developing their own bug bounties, also known as software vulnerability disclosure programs. Organizations may use these guidelines to help them create…
-
"Most damaging threat vector for companies? Malicious insiders"A new survey conducted by SANS reveals that organizations are increasingly recognizing malicious insiders as the greatest threat to their systems. There are several factors that can lead to the performance of insider threat activities such as…
-
"Senators introduce bill to secure Internet of Things devices"A new bill that aims to address issues pertaining to the security of IoT devices has been introduced by a bipartisan group of U.S. senators. Recent attacks on IoT devices have ignited concerns about the lack of security that has been implemented for such…
-
"Researchers pwn Alexa, turning Amazon Echo into covert snooping device"A vulnerability within the popular Amazon Echo device has been discovered by researchers at MWR InfoSecurity that could be exploited to enable attackers to secretly eavesdrop on users and steal sensitive data. Researchers reveal that this vulnerability…
-
"EU's GDPR: What Will American Companies Have To Do To Comply?"Starting in the Spring of 2018, the European Union’s General Data Protection Regulation (GDPR) will be in effect. The objective of the GDPR is to strengthen the protection of data belonging to citizens within the EU. However, this regulation will have an…
-
"Applied cybersecurity research for better protection of critical national infrastructure sectors"Cyber Apex Solutions, LLC, has been awarded a five-year Other Transaction Agreement (OTA) with a maximum value of $70 million by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to aid applied research of prototype…
-
"Hackers accidentally create network-busting malware"Arbor Networks has presented new details of the latest variant of the Mirai botnet, which has been designed to exploit IoT devices in one network to launch attacks on another. It has been revealed by researchers that this variant could knock networks…
-
"Creating a Common Language Of Cybersecurity"In support of creating a common language for the management and reporting of cyber threats to government organizations and industries, the Office of the Director of National Intelligence is developing standard definitions to improve the communcation and…
-
"The National Crime Agency is sending hackers to rehab"The National Crime Agency has developed a cyber-rehabilitation program for young hackers in hopes of encouraging the use of such skills for good. The first two-day camp of the “Prevent” program was held in July with all attendees being perpetrators of…
-
"Homograph attacks: Don’t believe everything you see"ESET security researchers have brought attention to homograph attacks, which could potentially pose significant threats to users as it advances the act of spoofing. Fraudulent websites can be designed to appear secure as attackers could convert the…
-
"House Panel Passes Bills to Reorganize DHS Cyber Team and Collect Zero-Day Info"The U.S. House Committee on Homeland Security passed two bills that aim to restructure the Department of Homeland Security’s (DHS) cybersecurity operations and establish a report on practices performed by the government in the process of…