News
-
"Your Car May Be Vulnerable to Cyberattacks – Even the Smartest of Smart Cars Have Issues"While smart cars offer unique benefits, they also introduce significant security risks that have the potential to lead to loss of life. As vehicles increase in connectivity to the internet, they become more vulnerable to being hacked, manipulated, and…
-
"Manhattan Hotel to Pilot Cyber-Safe Travel Program"A historic New York hotel will be implementing a program to protect its guests from cybercriminals. The Martinique New York on Broadway will pilot a program, called Cyber Safe Travel, designed to protect guests' mobile devices through the use of…
-
"Researchers Bypass Airport and Payment Facial Recognition Systems Using Masks"The implementation of biometrics technology such as facial recognition continues to grow. However, researchers from the artificial intelligence company, Kneron, have proved that facial recognition biometrics is not as strong or foolproof as one would…
-
"Major Vulnerabilities Found in Popular Wireless Presentation System"During new research F-Secure consultants, discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. The vulnerabilities discovered would allow attackers to intercept and manipulate information during presentations…
-
"Organizations Moving Toward More Rigorous Security Testing to Ensure Compliance"The 2020 State of Compliance and Security Testing Report released by Synack highlights results from a survey in which 311 North American organizations shared information about their security compliance testing. The results gave insight into the…
-
"The Race for Quantum-Proof Cryptography"There needs to be an increase in mathematical research aimed at developing quantum-proof cryptography as the era of fully developed quantum computers approaches. Such research is needed because quantum computers are expected to be capable of breaking…
-
"Snatch Ransomware Reboots Machines In Safe Mode to Bypass Endpoint Protection"The Sophos Managed Threat Response (MTR) team discovered a sample of Snatch ransomware when they were investigating an organization's network for a ransomware infection. Further analysis of the new strain of Snatch ransomware revealed that it evades…
-
"Most Security Pros Admit to Accidental Internal Breaches at Their Organization"A survey conducted by Egress to which 500 IT security decision-makers in the U.S. responded. Findings from the survey reveal that inadvertent internal breaches are becoming a greater threat to organizations. In addition to accidental employee breaches,…
-
"New Orleans Has Declared a State of Emergency After a Cyberattack"New Orleans declared a state of emergency following the detection of a cyberattack on its networks. According to the city's head of IT, Kim LaGrue, shortly after the detection of suspicious activity in the city's networks, there was a sharp increase in…
-
"Plundervolt – Stealing Secrets by Starving Your Computer of Voltage"Researchers discovered a new vulnerability, and are calling it Plundervolt. The vulnerability is caused by an individual running a processor on a voltage that’s a little bit lower than it usually expects, for example, 0.9V instead of…
-
"Secure Data Backup of Medical Records Using Secret Sharing and Secure Communications"A secure data backup system for medical records, called Healthcare Long-term Integrity and Confidentiality Protection System (H-LINCOS), was developed by the National Institute of Information and Communications Technology, Kochi Health Science Center,…
-
Open for Nominations - Submission Period Extended!The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.