News
-
"Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys"An 11 year old boy named Reuben Paul performed a demonstration at a cybersecurity conference, showing the weaponisation of interconnected smart toys through the infiltration of Bluetooth devices, which left the audience astonished. This article discusses…
-
"Unraveling mobile banking malware, Check Point"Check Point researchers have conducted an investigation to decipher the operation behind banking malware. It has been discovered that the development and operation of banking malware requires little skill with the availability of simplified tools and…
-
"What's next for NIST cybersecurity framework?"Officials at an NIST event emphasize the importance for constant maintenance of cyber procedures as the evolution of attacks continue. It is essential for companies to perform continuous maintenance so that in the case of an attack, operations aren’…
-
"Oddities in WannaCry ransomware puzzle cybersecurity researchers"The massive spread of the WannaCry ransomware to more than 100 countries within a few hours have left cybersecurity researchers baffled as to how this attack was initiated, the rapid speed of which it spread as well as how the hackers behind this attack…
-
"Keylogger Found in Audio Driver of HP Laptops"Researchers at Modzero, a Swiss cybersecurity firm, have revealed their discovery of a keylogger hidden within audio drivers of HP laptops. This feature found in the audio driver is identified as a keylogger as it records and saves all of a user’s…
-
"DHS S&T’s Transition to Practice program unveils 2017 cohort"Researchers at federally funded laboratories and academic research centers are prepared to introduce new cybersecurity technologies that they have developed to the commercial market. The eight new technologies will be showcased by DHS Science and…
-
"President Trump signs cybersecurity executive order"The highly anticipated executive order addressing cybersecurity has been signed by President Trump. Tom Bossert, Trump’s homeland security adviser, states that the order has been devised to achieve the president’s goal to protect the security of America…
-
"Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms"A study conducted by Bronium, a cybersecurity company, at RSAC 2017 reveal the average percentages of security professionals that have admittedly given into ransomware demands as well as evaded or disabled security protocols put in place by their…
-
"Microsoft’s novel approach to securing IoT"With the rise of IoT bots like Mirai, new approaches must be developed to ensure the continuous renovation and integrity of IoT devices. Microsoft is aiming to change the course of IoT deployments with Project Sopris. Project Sopris hardware is expected…
-
"Researchers unveil new password meter that will change how users make passwords"Researchers from Carnegie Mellon University and the University of Chicago have introduced a new advanced password meter to assist people in creating stronger passwords. Traditional password meters will simply indicate whether a password is weak or strong…
-
"Hackers Are Remotely Controlling Industrial Robots Now"Security researchers have discovered the possibility of hacking industrial robots. Security researchers demonstrated this possibility by hacking the IRB 140 industrial robot arm. This robot could be hacked to disturb the motion of drawing a straight line…
-
"New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack"A new IoT Botnet, Persirai, has been discovered by researchers at Trend Micro. Persirai has targeted 1,000 different models of IP cameras, leaving 120,000 cameras vulnerable to attacks. This article further discusses the details of Persirai, how…