-
"Mac malware continuing to escalate, warn security researchers"Data collected by security firm, Malwarebytes, show that there has been a significant increase in malware targeting the Mac OS during 2017. Data also shows that more Mac malware families have emerged in the first half of 2017 than in previous years. The…
-
"Wanted: Metrics for Measuring Cyber Performance and Effectiveness"As organizations continue to face the evolving cybersecurity threat landscape, chief information security officers (CISOs) must face the difficult challenges of selecting which cybersecurity tools to implement into their systems and measuring the…
-
"Popular Messaging Apps: Encrypting Is Easy but Authenticating Is Hard"A recent study conducted by researchers at BYU reveal that users of popular messaging apps, Facebook Messenger, What’sApp, and Viber, are not fully utilizing security options made available on these apps, which leaves users vulnerable to fraud and other…
-
"'Pulse Wave' DDoS Attacks Emerge As New Threat"A new form of distributed denial-of-service (DDoS) attacks has been discovered by security vendor, Imperva. These DDoS attacks have been described as pulse wave attacks in which short bursts of malicious attack traffic are launched at multiple targets at…
-
"Seven Keys to Strengthen Your Cybersecurity Culture"In order for organizations to more effectively mitigate cybersecurity weaknesses, a culture of cybersecurity must be fostered within the workplace. Data breaches faced by companies are often the result of employee negligence, therefore further engagement…
-
-
"Researchers warn against 'hackable' robots"Researchers at IOActive have warned of flaws discovered within various commercially available robots, which could be exploited to allow hackers to physically harm and spy on users. Through the investigation of notable robots such as Pepper, Nao, and many…
-
"How One Energy Department Lab Uses Physics to Boost Cybersecurity"A new approach to cybersecurity has been designed by the Energy Department’s Oak Ridge National Laboratory (ORNL) to improve upon the speed and security of sharing and protecting encrypted data. This method uses quantum light particles (photons) rather…
-
"A Replacement Screen Could Offer Hackers A Key To Your Smartphone"According to a new study conducted by researchers at Ben-Gurion University, third-party smartphone replacement parts may consist of maliciously programmed chips, which could be used to hack smartphones in order to perform malicious activities and steal…
-
"Defeating cyberattacks on 3-D printers"3D printers are expected to become more attractive targets of cyberattacks as this technology is now being utilized to print objects and parts used in critical infrastructure. The launch of cyberattacks targeting 3D printers may significantly impact…
-
"How to improve IoT security"Security challenges arise as the use of Internet of Things (IoT) continues to grow. Devices connected to the internet can pose risks to the safety, security, and privacy of users. A recent meta-study titled, “The Internet of Hackable Things”, in which…
-
“NIST Advocates Use of Longer Passwords to Improve Security”The U.S. National Institute for Standards and Technology (NIST) has updated its guidelines in support of increasing the complexity of passwords through the creation of longer passwords. According to NIST Special Publication 800-33B titled, “Digital…
News