News
  • "Microsoft: 99.9% of Compromised Accounts did not use Multi-Factor Authentication"
    Microsoft tracks over 30 billion login events per day and over one billion monthly active users.  Of all the accounts, about 0.5 percent of them become compromised each month.  In January 2020 1.2 million Microsoft accounts were compromised.…
  • "Hackers Are Targeting Other Hackers by Infecting Their Tools With Malware"
    The Cybereason Nocturnus team discovered a malware campaign where attackers are injecting and repackaging hacking tools with njRat, bringing further attention to the targeting of hackers by other hackers. The powerful trojan, njRat, can allow attackers…
  • "Autonomous Vehicles Can Be Fooled to 'See' Nonexistent Obstacles"
    Autonomous vehicles see the world through the use of multiple sensors. Most autonomous vehicle systems use cameras, radar sensors, and LiDAR (light detection and ranging) sensors. The data collected through cameras and sensors are combined by an onboard…
  • "Mobile Attacks Outpace Desktop Assaults"
    Researchers at LexisNexis Risk Solutions found that the number of attacks on mobile devices has surpassed the number of assaults faced by desktops. There were 264 million attacks on mobile devices 137 million attacks on desktops between July and December…
  • "Open Cybersecurity Alliance (OCA) Advances Mission to Bring Interoperability Across Cybersecurity Products"
    The Open Cybersecurity Alliance (OCA) is a consortium of cybersecurity vendors, including IBM and McAfee, that aims to address the problem of security complexity faced by organizations. This challenge derives from the integration of cybersecurity…
  • "Passwords Still Dominant Authentication Method, Top Cause of Data Breaches"
    Most applications, business devices, and data use only usernames and passwords for authentication.  Passwords are still the top attack vector for organizations.  Researchers from EMA surveyed 200 IT and security managers and discovered that 42…
  • "Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys"
    Researchers from KU Leuven in Belgium and the University of Birmingham in the UK recently revealed new vulnerabilities that they discovered in the encryption systems used by car engine immobilizers, the radio-enabled devices that allow the ignition to be…
  • "FBI Working to 'Burn Down' Cyber Criminals’ Infrastructure"
    According to the FBI Director, Christopher Wray, work is being done to take down the infrastructure and tools used by cybercriminals to execute increasingly dangerous attacks. The FBI is targeting the Dark Web as it has provided a platform for…
  • "Ransomware Attack on Sheep Farmers Reinforces Need for Diverse Cyber Defenses"
    The IT company, Talman Software, faced a ransomware attack that severely affected wool sales as the firm processes more than 75 percent of wool sales in Australia and New Zealand. This incident further highlights how cyberattacks can impact the economy…
  • "'Internet of Things' Could Be an Unseen Threat to Elections"
    Laura DeNardis, Professor of Communication Studies at the American University of Communication wrote a book, titled "The Internet in Everything: Freedom and Security in a World with No Off Switch," in which she discussed how unsecured Internet of Things…
  • "Researchers Discover That Intel Chips Have an Unfixable Security Flaw"
    Security researchers at Positive Technologies have discovered a flaw in Intel chips that is very difficult to exploit and is completely unpatchable. The vulnerability is within Intel's Converged Security and Management Engine (CSME). CSME is a part of…
  • "IT Startup Develops Novel Blockchain-Based Approach for Secure Linking of Databases"
    Researchers at Saarland University developed software, called "ChainifyDB," that uses a blockchain-based approach to allow different companies to connect their database management systems and securely process the data records needed for collaboration.…