News
  • "Cybercriminals Using Enterprise-Based Strategies For Phishing Kit Development And Deployment"
    Research conducted by Akamai Technologies found that cybercriminals are using enterprise-based development and deployment strategies to target some of the world's biggest tech brands, including Microsoft, PayPal, DHL, and Dropbox. The strategies being…
  • "Collaboration Required to Improve Connected Medical Device Security"
    Booz Allen Hamilton and the eHealth Initiative Foundation calls for an increase in collaborative efforts to improve the security of medical devices. The Securing Medical Connected Medical Devices report done by Booz Allen and eHI emphasizes the…
  • "Got an Early iPhone or iPad? Update now or Turn it Into a Paperweight"
    If you own an Apple iPhone 5, iPhone 4s or one of the early iPads with cellular connectivity, your device is about to be affected negatively by the GPS rollover problem. To avoid problems, one must update their device to iOS version 10.3.4 (…
  • "Most Decision Makers Expect AI and 5G to Impact Their Cybersecurity Strategy"
    Information Risk Management (IRM) conducted a survey to which senior cybersecurity and risk management decision makers at 50 global companies within the automotive, communications, energy, finance/public sector, software/internet, transport and…
  • "This Old Trojan Malware Is Back With a New Trick to Help It Hide in Plain Sight"
    Researchers at Menlo Security have released details about a new variant of the Adwind remote access trojan (RAT), also known as AlienSpy and jRAT. Adwind was originally discovered in 2013 and can be accessed by cybercriminals via a malware-as-a-service…
  • "Imagine the U.S. Was Just Hit With a Cyberattack. What Happens Next?"
    A panel of experts in cybersecurity and national security were given hypothetical cyberattack scenarios, including one in which unknown hackers have gained access to a gas pipeline company's computers, networks, and hardware. The experts were then asked…
  • "Hackers Finding Ways to Exploit Automotive Software to Overtake Cars"
    Traditionally, cars have been considered too difficult for hackers to hack.  It was also believed, that cars were not at a high risk of being hacked, because of the large amount of time and energy required for an adversary to hack a…
  • "Johannesburg Struggles to Recover From Ransomware Attack"
    It has been discovered that Johannesburg has been hit with a ransomware attack that is crippling municipal services.  It was detected last Thursday and is still affecting them today.  A group calling itself Shadow Kill Hackers…
  • "Browser Tool Aims to Help Researchers ID Malicious Websites, Code"
    An open-source tool, called VisibleV8, has been developed by researchers from North Carolina State University. VisibleV8 was designed to run in the Chrome browser and detect malicious Javascript programs that can circumvent malware detection systems…
  • "Microsoft's New Plan to Defend the Code Deep Within PCs"
    Microsoft has announced a new hardware and system architecture feature, named secured-core PC. The feature for Windows will defend the foundational code, firmware, against hacking. Firmware provides instructions on how the device communicates with other…
  • "Using Physics to Keep Our Electrical Grid Safe"
    Computer security expert, Sean Peisert, and a team of researchers at Berkeley Lab are working to improve the security of the electrical grid, vehicles, manufacturing plants, and other cyberphysical systems in which physical components are merged with…
  • We're Surrounded by Billions of Internet-connected Devices. Can We Trust Them?
    BY ADAM PIORE ON 10/24/19 AT 12:24 PM EDT - NEWSWEEK MAGAZINE In 2009, just as consumers had begun to buy wifi-enabled thermostats and front-door cams and other early devices that now make up the "Internet of Things," computer scientist Ang…