News
-
"How Data Breaches Are Hurting Small Businesses"Bank of America Merchant Services released a report, which discusses how data breaches impact small businesses and how SMBs handle problems related to such incidents. A survey of consumers and small businesses found that 21 percent of SMBs experienced a…
-
NSA-approved cybersecurity law and policy course now available onlineNSA-approved cybersecurity law and policy course now available online Cyber Scoop Shannon Vavra August 27th, 2019 Anyone who is interested in cybersecurity law and policy can now take an online course that was partly shaped by National Security…
-
" Iranian Hacking Group Continues Targeting Universities"It has been discovered that a hacking group with suspected ties to Iran is continuing a campaign of targeting dozens of schools and universities with phishing emails to obtain credentials and then attempt to access and steal intellectual property.…
-
"Should Social Media Organizations Be Subject to Strict Privacy Regulation?"A survey was conducted at the 2019 Black Hat USA information security conference to which 384 IT security professionals responded. The results of the survey show that most IT security professionals agree on the need for more security and privacy…
-
"Attackers Are Targeting Internet-Connected Gas Stations: Researchers"Researchers at Trend Micro have discovered the vulnerability of internet-connected gas pumps to IoT-based attacks. According to Trend Micro's recent report, titled Internet of Things in the Cybercrime Underground, step-by-step tutorials on how to hack…
-
"Aviation Security Is Taking Off—And Taking After Car Security"Although hackers, security researchers, government organizations, and private airlines have expressed that the chances of a commercial flight getting hacked are significantly small, David Holmes, director of engineering at the United States Digital…
-
"Wikipedia Fights off Huge DDoS Attack"It has been discovered that Wikipedia was affected by a DDoS attack that lasted for almost three days. The DDoS attack was an an old-style volumetric flood, designed to overwhelm the company’s web servers with bogus HTTP traffic. During…
-
"Vulnerabilities in D-Link, Comba Routers Can Leak Credentials"Security researchers at Trustwave SpiderLabs found five vulnerabilities in D-Link and Comba Telecom routers. D-Link DSL modems contain two security flaws, while Comba Telecom Wi-Fi devices were discovered to contain three vulnerabilities. According to…
-
"More Than 99% of Cyberattacks Rely on Human Interaction"It has been discovered that more than 99 percent of cyberattacks rely on human interaction to work. This makes individual users the last line of defense. In order to significantly reduce human risks, organizations need a holistic…
-
"Can States Get Ahead of Election System Cyberthreats?"According to Chris Kreb, the director of the Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS), efforts are being made by the agency to raise awareness surrounding cyber hygiene resources and…
-
"Symantec Finds That a 'New' Chinese Hacking Group Has Actually Been Around for a Decade"A Chinese cyber-espionage group, called Thrip, has been discovered by security researchers to have been around for much longer than previously thought. Thrip is believed to be the same as another threat group that has already been discovered by…
-
"Holy Cybercrime, Batman! Joker Malware Commits Ad Fraud, Data Theft"Aleksejs Kuprins, a security researcher from the cybersecurity threat intelligence firm, CSIS, discovered the infection of 24 Android apps available on the Google Play Store with a new Android malware, called Joker. These apps were collectively…