News
-
"Closing The Cybersecurity Gender Gap Would Boost The US Economy by $30B"In the cybersecurity field, a significant gender gap exists. Even though there are 4 million job vacancies in the US and UK, it is hard to get more women interested in the cybersecurity field. Women occupy less than a quarter of cybersecurity…
-
"Next Generation 911 Services 'Highly Vulnerable to Cyber Attack'"Researchers at Ben-Gurion University of the Negev (BGU) conducted a study in which they examined the impact of DDoS attacks on the current (E911) and next-generation 911 (NG911) infrastructures in North Carolina. According to the researchers, the next…
-
"AMD Processors Susceptible to Security Vulnerabilities, Data Leaks"Researchers at Graz University of Technology discovered that AMD CPU microarchitectures from 2011 to 2019 are vulnerable to side-channel attacks. In a paper, titled "Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors," the…
-
"Microsoft: 99.9% of Compromised Accounts did not use Multi-Factor Authentication"Microsoft tracks over 30 billion login events per day and over one billion monthly active users. Of all the accounts, about 0.5 percent of them become compromised each month. In January 2020 1.2 million Microsoft accounts were compromised.…
-
"Hackers Are Targeting Other Hackers by Infecting Their Tools With Malware"The Cybereason Nocturnus team discovered a malware campaign where attackers are injecting and repackaging hacking tools with njRat, bringing further attention to the targeting of hackers by other hackers. The powerful trojan, njRat, can allow attackers…
-
"Autonomous Vehicles Can Be Fooled to 'See' Nonexistent Obstacles"Autonomous vehicles see the world through the use of multiple sensors. Most autonomous vehicle systems use cameras, radar sensors, and LiDAR (light detection and ranging) sensors. The data collected through cameras and sensors are combined by an onboard…
-
"Mobile Attacks Outpace Desktop Assaults"Researchers at LexisNexis Risk Solutions found that the number of attacks on mobile devices has surpassed the number of assaults faced by desktops. There were 264 million attacks on mobile devices 137 million attacks on desktops between July and December…
-
"Open Cybersecurity Alliance (OCA) Advances Mission to Bring Interoperability Across Cybersecurity Products"The Open Cybersecurity Alliance (OCA) is a consortium of cybersecurity vendors, including IBM and McAfee, that aims to address the problem of security complexity faced by organizations. This challenge derives from the integration of cybersecurity…
-
"Passwords Still Dominant Authentication Method, Top Cause of Data Breaches"Most applications, business devices, and data use only usernames and passwords for authentication. Passwords are still the top attack vector for organizations. Researchers from EMA surveyed 200 IT and security managers and discovered that 42…
-
"Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys"Researchers from KU Leuven in Belgium and the University of Birmingham in the UK recently revealed new vulnerabilities that they discovered in the encryption systems used by car engine immobilizers, the radio-enabled devices that allow the ignition to be…
-
"FBI Working to 'Burn Down' Cyber Criminals’ Infrastructure"According to the FBI Director, Christopher Wray, work is being done to take down the infrastructure and tools used by cybercriminals to execute increasingly dangerous attacks. The FBI is targeting the Dark Web as it has provided a platform for…
-
"Ransomware Attack on Sheep Farmers Reinforces Need for Diverse Cyber Defenses"The IT company, Talman Software, faced a ransomware attack that severely affected wool sales as the firm processes more than 75 percent of wool sales in Australia and New Zealand. This incident further highlights how cyberattacks can impact the economy…