News
-
"Russian Researchers Claim First Quantum-Safe Blockchain"The Russian Quantum center has announced its development of the first quantum-safe blockchain, which will be used to combat the risk of quantum cryptography. This new development is set to secure cryptocurrencies, confidential government communications,…
-
"HHS Ramps Up Cyber Threat Information Sharing"Warnings delivered by the Department of Health and Human Services pertaining to the launchings of the WannaCry ransomware in addition to daily conference calls with healthcare sector stakeholders following the attacks, indicate the growing improvement of…
-
"Credential-Stuffing Threat Intensifies Amid Password Reuse"The reuse of passwords by employees pose a bigger security threat than expected as hackers are increasingly performing acts of credential-stuffing. The act of credential-stuffing includes the use of automated systems to perform brute-force logins into a…
-
"Using Bitcoin to prevent identity theft"Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory are presenting a new system that they have developed to use Bitcoin security mechanisms to shield against acts of online identity theft. This article further discusses the…
-
"Check Point Discovers Media Subtitle Vulnerability Impacting Millions"According to Check Point security researchers, attackers can exploit vulnerabilities within media player subtitles to perform malicious activity, which could pose serious threats to the security of millions of users. Media players that have been …
-
“SCADA systems plagued by insecure development and slow patching”In a new report released by Trend Micro, researchers share details of their examination and discovery of vulnerabilities affecting Human Machine Interfaces of SCADA systems. As various segments of the critical infrastructure rely on SCADA systems to…
-
“Is the world ready for GDPR? Privacy and cybersecurity impacts are far-reaching”The General Data Protection Regulation (GDPR) will go into effect on May 25, 2018. The GDPR consists of rules enforced by the European Commission to govern the privacy and security of personal data. Though this regulation is being put forward by the…
-
"DHS wargames included a scenario similar to WannaCry"Before the launch of WannaCry malware, the Department of Homeland Security conducted a national drill to observe the reactions of the government and the private sector in the case of a multi-sector cyberattack targeting critical infrastructure. It has…
-
"Network traffic provides early indication of malware infection"Researchers reveal the capability of detecting malware infection far in advance with the examination of malware-related network traffic carried by an ISP preceding the actual detection of malware. In the study of this new malware-independent…
-
2017 ISEF Winners of NSA RD AwardsAnd the National Security Agency Research Directorate Awards Winners are:
-
"Fujitsu high-speed technology identifies within minutes damage from cyberattacks"Fujitsu has announced a high-speed forensic technology that they have developed to identify the degree to which an organization's intranet has been damaged after a targeted cyberattack. Fujitsu's new technology shortens the average time required to…