News
-
"Group Said to Be Behind Attempted Campaign Hack Has Also Gone After Cybersecurity Researchers"The Iranian-linked hacking group that made more than 2,000 attempts to compromise email accounts associated with a U.S. presidential campaign, government officials, journalists, and prominent Iranians that live outside Iran, is also said to be targeting…
-
"New Data Analysis Approach Could Strengthen the Security of IoT Devices"It has been discovered that a multi-pronged data analysis approach can strengthen the security of IoT devices. One of the data analysis techniques the researchers applied during the study was an open-source freely available R…
-
"NIST is Hunting for Tech to Secure the Energy Sector’s Network"Efforts are being made by the U.S. National Institute of Standards and Technology's (NIST) National Cybersecurity Center of Excellence (NCCoE) to bolster the security of the Industrial Internet of Things (IIoT) attached to the nation's power grid.…
-
"NIST and Microsoft Partner to Improve Enterprise Patching Strategies"Microsoft and the U.S. NIST National Cybersecurity Center of Excellence (NCCoE) will team up to help enterprises improve their security patch management strategies. Better patching strategies could have reduced the impact of WannaCry and NotPetya.…
-
"BitPaymer Ransomware Attackers Exploit Apple Flaw to Bypass Detection"A zero-day flaw in iTunes for Windows and iCloud for Windows has been patched by Apple. The actual bug was contained by Bonjour, a component that comes with iTunes for Windows machines used to deliver updates and help services discover each other.…
-
"Attackers Hide Behind Trusted Domains, HTTPS"A new report from Webroot brings further attention to the use of HTTPS domains to host phishing attacks. Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP that uses the Transport Layer Security (TLS) protocol to secure connections…
-
"Combination of Techniques Could Improve Security for IoT Devices"A team of researchers at Penn State World Camp have developed an approach consisting of a combination of different techniques to bolster the security of Internet of Things (IoT) devices such a smart TVs, smart speakers, wearables, and home video cameras…
-
"Hackers Bypassing Some Types of 2FA Security FBI Warns"It has been discovered by the FBI that some types of two-factor authentication (2FA) security can no longer be guaranteed to keep adversaries out. Their are several methods cyber actors use to circumvent popular multi-factor authentication…
-
"Using Machine Learning to Hunt Down Cybercriminals"Researchers at MIT and the University of California at San Diego (UCSD) have developed a new machine-learning (ML) system that can be used to prevent IP hacking incidents before they occur by identifying serial IP hijackers. IP hijacking is a type…
-
"Twitter Admits It Used Two-Factor Phone Numbers and Emails for Serving Targeted Ads"Another incident has raised concerns over the misuse of customer data by social media giants. Twitter recently admitted to using phone numbers and email addresses provided by users to enable two-factor authentication on their accounts for targeted…
-
"A Controversial Plan to Encrypt More of the Internet"Google and Mozilla plan to encrypt a fundamental element of the Internet, the Domain Name System (DNS). Security was not considered in the design of DNS, allowing hackers to abuse weaknesses and vulnerabilities in the Internet system through a variety of…
-
"Majority of IT Departments Leave Major Holes in Their USB Drive Security"In a new study, it was found that even though 87% of organizations use USB drives, the majority of IT departments aren’t implementing tools to manage USB device usage. Nearly 6 out of 10 organizations (58%) do not use port control /…