News
-
"New Cyber Security Guide Is the First to Gather Global Expertise"Cybersecurity experts have combined their academic and industry expertise to assemble a new authoritative cybersecurity guide. The guide, titled Cyber Security Body of Knowledge (CyBOK), was developed in support of filling the security skills gap and…
-
"Machine Learning Advances New Tool to Fight Cybercrime in the Cloud"The increasing use of cloud applications such as Dropbox and Google Drive has raised concerns about the use of cloud information by cybercriminals in performance of illegal activities. A cloud forensic model has been developed by researchers at Purdue…
-
"Only 47% of Cybersecurity Pros are Prepared to Deal With Attacks on Their IoT Devices"In a new study, it was found that fewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment. These findings come at a time in which 48% of organizations admitted to…
-
"Amazon Fixes Ring Video Doorbell Wi-Fi Security Vulnerability"Researchers at Bitdefender have reported the presence of a security vulnerability in Amazon's Ring Video Doorbell that could have been exploited by hackers to gain access to an owner's home Wi-Fi network. The vulnerability derived from the process of…
-
"Determined Hackers Will Crack Voting Machines, Security Researchers Say"Harri Hursti and Matt Blaze, founders of the Voting Village at the DefCon security conference in Las Vegas, have stressed the importance of strengthening the security of voting machines ahead of election day. Voting machine vendors need to increase their…
-
"Phishing Attacks at Highest Level in Three Years"In a news study, researchers found that the total number of phishing sites detected in July through September 2019 was 266,387. This was up 46 percent from the 182,465 seen in the second quarter of 2019, and almost double the 138,328 seen in Q4 2018.…
-
"Study Finds Companies May Be Wise to Share Cybersecurity Efforts"A study conducted by researchers at North Carolina State University found that companies are considered less attractive when they share a field with a company that has a faced a cybersecurity breach. Companies that are more transparent about how they…
-
"Defenders Can Discover Phishing Sites Through Web Analytics IDs"There has been an increase in the use of web analytics services by phishing websites. The unique tracking IDs added to the code of phishing websites when these services are used can help defenders detect phishing attacks. Web analytics services help…
-
"Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap"Researchers during a new study concluded that there is a current shortage of skilled cybersecurity professionals. The researchers estimate that the current cybersecurity workforce at 2.8 million professionals, and estimates that 4.07…
-
"Machine Learning: With Great Power Come New Security Vulnerabilities"There have been many advancements in machine learning (ML) as it has been applied in the operation of self-driving cars, speech recognition, biometric authentication, and more. However, ML models remain vulnerable to a variety of attacks that could lead…
-
"Chinese Researchers Reveal Method to Bypass Biometric Fingerprint Scanners in Smartphones"Security researchers from X-Lab at Tencent gave a presentation at the GeekPwn 2019 conference in which they brought further attention to the possible circumvention of fingerprint security. The researchers claimed to have successfully bypassed biometric…
-
"Alexa, Siri, Google Assistant Smart Speakers – They're All Open to Remote Laser Attacks"In a new study conducted by researchers at the University of Electro-Communications in Tokyo and the University of Michigan, found a new way for hackers to affect smart devices. The new way to affect smart devices is through Light…