News
-
"BEC scams: How to avoid them and how to fight back"Enterprises are frequently bombarded with phishing and spear phishing emails. While most companies have implemented security measures such as antivirus systems and spam filters to combat such attacks, these security methods are still insufficient in…
-
"IARPA explores easy-to-use cryptography"The Intelligence Advanced Research Project Activity (IARPA) plans to provide a framework through the Homomorphic Encryption Computing Techniques with Overhead Reduction (HECTOR) program, which will serve to help system architects and application…
-
"Verizon Breach: 6 Million Customer Accounts Exposed"Verizon has faced a massive breach as 6 million customer accounts have been exposed. Data that has been exposed include names, addresses, phone numbers, customer PIN codes, and more. Researcher from the cyber risk team at UpGuard, Chris Vickery,…
-
"Research: businesses over confident about ability to fend off hackers"Findings of Gemalto’s fourth-annual Data Security Confidence Index show that a majority of IT professionals are overconfident in perimeter security technologies such as antivirus and firewalls. The concentration on perimeter security, however, is…
-
"New solution prevents bots from accessing API servers"Distil Networks has developed a new solution to preventing access to API servers from bots, which will be provided through Bot Defense for Mobile App APIs. Attacks such as brute force, online fraud, compromise of accounts, and many others, often arise…
-
"UCI Cybersecurity Policy & Research Institute Launches Initiatives to Combat Cyber Threat"The Cybersecurity Policy & Research Institute (CPRI) at the University of California, Irvine proposes to take action against vulnerabilities and cyberattacks through the development of research projects, improved information sharing, law enforcement…
-
"Enterprise Complexity Requires New Security Approaches"According to a report from Aberdeen Group, improving upon the speed of detecting and responding to cyberattacks, significantly reduces the impact on the availability of enterprise computing infrastructure. This report also reveals rates in which…
-
"DHS Updates on Federal Network Cybersecurity, Infrastructure"Updates have been posted by the Department of Homeland Security’s (DHS) United States Computer Emergency Readiness Team (US-CERT) in regards to federal network cybersecurity processes and current actions being taken to improve upon infrastructure…
-
"Insider wreaks havoc on company—after he resigns"The Navarro Security Group of Florida faced an incident in which a former employee decided to inflict major damages to the company after his departure. With malicious intent to destroy the company that he used to work for, Jonathan Eubanks infiltrated…
-
"The Pros and Cons of Automated Cybersecurity"Microsoft’s acquisition of Hexadite, which is a U.S.-Israeli artificial intelligence cybersecurity firm, highlights the growing interest in implementing automation technology into cybersecurity to keep up with the growing threat landscape faced by…
-
"Self-Service Kiosk Maker Avanti Markets Hacked"Approximately 1,900 of Avanti Markets’ self-service kiosk vending machines have been hacked using a version of point-of-sale (POS) malware called Poseidon. In the outbreak of this malware, sensitive information has been stolen including users’ names on…
-
"Entangled photons help bug-proof communication"As the processing power of computers increases, the less difficult it becomes to decode encrypted data. The full development and implementation of quantum computing can, in fact, deem current encryption algorithms obsolete due to the faster and more…