News
-
"Could Your Vacuum be Listening to You?"A team of researchers at the University of Maryland (UMD) captured speech, music, and other sounds by gathering information from a popular vacuum robot's laser-based navigation system and applying techniques in signal processing and deep learning. This…
-
"50% of Advanced Phishing Attacks Evade Leading Secure Email Gateways"New research from IRONSCALES reveals that nearly 50% of all advanced phishing attempts such as spear-phishing and social engineering attacks evade Secure Email Gateways (SEGs). Hackers are turning to more complex methods that exploit human nature.…
-
"US Holiday Shoppers Fear Cyber-Scams"McAfee commissioned 3Gem to survey 1,000 adults over the age of 18 in the US between October 8 and October 13, 2020. The results of McAfee's "2020 Holiday Season: State of Today's Digital e-Shopper" survey indicate that 36% of American consumers plan on…
-
"ThreatList: Pharma Mobile Phishing Attacks Turn to Malware"Adversaries are using mobile phishing attacks to target pharmaceutical companies more frequently since the beginning of COVID-19 and have shifted their focus from credential theft to malware delivery. New research shows that 77 percent of pharmaceutical…
-
"Help Wanted: The Cybersecurity Workforce of the Future Starts with Students Today"The growing vulnerability of critical infrastructure systems to cyberattacks calls for more cybersecurity professionals that can help harden and protect them from unauthorized access. The cybersecurity workforce shortage remains as studies show that…
-
"Researchers Warn of Internet Security Risks Connected to Tesla Backup Gateway"Rapid7 researchers have brought attention to the security risks that stem from connecting the Tesla Backup Gateway to the internet. The Tesla Backup Gateway is designed to allow the automaker to manage solar and battery/Powerwall installations. It can…
-
"Why Biometrics Will Not Fix All Your Authentication Woes"The number of data breaches will increase in the future, and many organizations want to replace passwords with biometric authentication. Biometric authentication is becoming more widely used by organizations, and it is expected to create a market…
-
"Hackers Selling Credentials via 'Cloud of Logs'"New research from Trend Micro reveals the use of cloud services by cybercriminals to speed up attacks, thus decreasing the time needed for enterprises to identify and respond to an incident. Trend Micro also discovered an underground market called the…
-
"Is Your Smart Watch Sharing Your Data?"Users may be unaware of the exchange of data that household Internet of Things (IoT) devices, such as the Ring doorbell, Peloton exercise bike, and Nest thermostat conduct with other devices and systems over the network. These devices store various types…
-
"Exposed Database Reveals 100K+ Compromised Facebook Accounts"Researchers have discovered an exposed ElasticSearch database used by cybercriminals that revealed a global attack that compromised Facebook accounts. The unsecured database was used by fraudsters to store the usernames and passwords of at least 100,000…
-
"DoD Must Expand Its Mission-Critical Cybersecurity Focus to Include Connected Weapons"The 2020 Association of the United States Army (AUSA) Annual Meeting and Exposition presented various systems that will be available to the nation's military, many of which will be smart, connected weapons. The expected battlefield advantages offered by…
-
"Ransomware Incidents in Manufacturing Grow as Transparency, and Attack Options, Increase"According to the industrial security company Dragos, the number of documented ransomware incidents experienced by organizations in the manufacturing sector has increased significantly in 2020. Attackers continue to discover new ways to disrupt operations…