-
"Ransomware Attack Downs Hosting Service SmarterASP.NET"It has been discovered that SmarterASP.NET, a popular web hosting provider with more than 440,480 customers, has been hit with a ransomware attack. The ransomware attack took down its customers’ websites that were hosted by the company.…
-
"Legislation Introduced to Bolster Cyber Workforce"Bipartisan legislation aimed at strengthening cybersecurity education and addressing the cybersecurity workforce gap has recently been introduced by lawmakers. The Harvesting American Cybersecurity Knowledge through Education (HACKED) Act would expand…
-
"A Laser Pointer Could Hack Your Voice-Controlled Virtual Assistant"A team of researchers from the University of Michigan and the University of Electro-Communications in Tokyo has proven that it is possible for hackers to trick voice-controlled virtual assistants, including Siri, Alexa, and Google Assistant, into…
-
"Data Points Way to More Efficient, Secure Networks"Electrical and Computer Engineering professor Abdallah Shami and his team of researchers at the Optimized Computing and Communications (OC2) lab in Western Engineering are working to improve the security and efficiency of content delivery services (CDNs…
-
"Scammers Favor Malicious URLs Over Attachments in Email Phishing Attacks"According to Proofpoint's Third Quarter 2019 Threat Report, malicious URLs are dominating over attachments in email phishing attacks. One key takeaway from the third quarter of 2019 is that malicious URL messages made up 88% of all messages, containing…
-
"New Cyber Security Guide Is the First to Gather Global Expertise"Cybersecurity experts have combined their academic and industry expertise to assemble a new authoritative cybersecurity guide. The guide, titled Cyber Security Body of Knowledge (CyBOK), was developed in support of filling the security skills gap and…
-
"Machine Learning Advances New Tool to Fight Cybercrime in the Cloud"The increasing use of cloud applications such as Dropbox and Google Drive has raised concerns about the use of cloud information by cybercriminals in performance of illegal activities. A cloud forensic model has been developed by researchers at Purdue…
-
"Only 47% of Cybersecurity Pros are Prepared to Deal With Attacks on Their IoT Devices"In a new study, it was found that fewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment. These findings come at a time in which 48% of organizations admitted to…
-
"Amazon Fixes Ring Video Doorbell Wi-Fi Security Vulnerability"Researchers at Bitdefender have reported the presence of a security vulnerability in Amazon's Ring Video Doorbell that could have been exploited by hackers to gain access to an owner's home Wi-Fi network. The vulnerability derived from the process of…
-
"Determined Hackers Will Crack Voting Machines, Security Researchers Say"Harri Hursti and Matt Blaze, founders of the Voting Village at the DefCon security conference in Las Vegas, have stressed the importance of strengthening the security of voting machines ahead of election day. Voting machine vendors need to increase their…
-
"Phishing Attacks at Highest Level in Three Years"In a news study, researchers found that the total number of phishing sites detected in July through September 2019 was 266,387. This was up 46 percent from the 182,465 seen in the second quarter of 2019, and almost double the 138,328 seen in Q4 2018.…
-
"Study Finds Companies May Be Wise to Share Cybersecurity Efforts"A study conducted by researchers at North Carolina State University found that companies are considered less attractive when they share a field with a company that has a faced a cybersecurity breach. Companies that are more transparent about how they…
News