News
  • " Iranian Hacking Group Continues Targeting Universities"
    It has been discovered that a hacking group with suspected ties to Iran is continuing a campaign of targeting dozens of schools and universities with phishing emails to obtain credentials and then attempt to access and steal intellectual property.…
  • "Should Social Media Organizations Be Subject to Strict Privacy Regulation?"
    A survey was conducted at the 2019 Black Hat USA information security conference to which 384 IT security professionals responded. The results of the survey show that most IT security professionals agree on the need for more security and privacy…
  • "Attackers Are Targeting Internet-Connected Gas Stations: Researchers"
    Researchers at Trend Micro have discovered the vulnerability of internet-connected gas pumps to IoT-based attacks. According to Trend Micro's recent report, titled Internet of Things in the Cybercrime Underground, step-by-step tutorials on how to hack…
  • "Aviation Security Is Taking Off—And Taking After Car Security"
    Although hackers, security researchers, government organizations, and private airlines have expressed that the chances of a commercial flight getting hacked are significantly small, David Holmes, director of engineering at the United States Digital…
  • "Wikipedia Fights off Huge DDoS Attack"
    It has been discovered that Wikipedia was affected by a DDoS attack that lasted for almost three days. The DDoS attack was an an old-style volumetric flood, designed to overwhelm the company’s web servers with bogus HTTP traffic. During…
  • "Vulnerabilities in D-Link, Comba Routers Can Leak Credentials"
    Security researchers at Trustwave SpiderLabs found five vulnerabilities in D-Link and Comba Telecom routers. D-Link DSL modems contain two security flaws, while Comba Telecom Wi-Fi devices were discovered to contain three vulnerabilities. According to…
  • "More Than 99% of Cyberattacks Rely on Human Interaction"
    It has been discovered that more than 99 percent of cyberattacks rely on human interaction to work.  This makes individual users the last line of defense. In order to significantly reduce human risks, organizations need a holistic…
  • "Can States Get Ahead of Election System Cyberthreats?"
    According to Chris Kreb, the director of the Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS), efforts are being made by the agency to raise awareness surrounding cyber hygiene resources and…
  • "Symantec Finds That a 'New' Chinese Hacking Group Has Actually Been Around for a Decade"
    A Chinese cyber-espionage group, called Thrip, has been discovered by security researchers to have been around for much longer than previously thought. Thrip is believed to be the same as another threat group that has already been discovered by…
  • "Holy Cybercrime, Batman! Joker Malware Commits Ad Fraud, Data Theft"
    Aleksejs Kuprins, a security researcher from the cybersecurity threat intelligence firm, CSIS, discovered the infection of 24 Android apps available on the Google Play Store with a new Android malware, called Joker. These apps were collectively…
  • "Google Is Open-Sourcing a Tool for Data Scientists to Help Protect Private Information"
    Google will be releasing an open-source version of its differential privacy library, which will allow organizations to study their data without impacting the privacy of user information. Differential privacy is described as a cryptographic approach to…
  • "Bots Might Prove Harder to Detect in 2020 Elections"
    A new study conducted by a team of researchers shows that bots are getting better at copying human behaviors, which makes it harder for them to be detected. The researchers examined 250,000 social media users who took part in discussions surrounding the…