News
  • "Fake Mobile app Fraud Tripled in First Half of 2019"

    During a study of Quarter 2 of 2019, RSA Security identified 57,406 total fraud attacks worldwide. Of these, phishing attacks were the most prevalent (37%), followed by fake mobile apps (usually apps posing as those of popular brands).…

  • "How Do We Ensure GNSS Security Against Spoofing?"

    The Global Navigation Satellite System (GNSS) refers to satellite navigation systems that provide positioning, navigation, and timing (PNT) services with global coverage. If the GNSS suffered a major outage for one day, it would cost the U.S. an…

  • "Mathematicians Prove That Flash-Memory 'Fingerprints' of Electronic Devices Are Truly Unique"

    Mathematicians at RUDN University have proven that the defects in flash memory cells can be used as fingerprints for memory chips. This method will strengthen the security of electronic devices against hacks. The growth of devices such as smartphones,…

  • "AI Development has Major Security, Privacy and Ethical Blind Spots"

    In a new study, it has been discovered that the most serious blind spot during AI development is security. Nearly three-quarters (73%) of respondents in the study, indicated they don’t check for security vulnerabilities…

  • "NAU Cyberengineering Team Wins $6M Grant to Develop Computing Solutions to Combat Cyberattacks"

    The U.S. Air Force has awarded a $6.3 million grant to a team of researchers at Northern Arizona University. The grant was given to support the development of novel solutions to the growing sophistication and frequency of cyberattacks as well as the…

  • "Group Said to Be Behind Attempted Campaign Hack Has Also Gone After Cybersecurity Researchers"

    The Iranian-linked hacking group that made more than 2,000 attempts to compromise email accounts associated with a U.S. presidential campaign, government officials, journalists, and prominent Iranians that live outside Iran, is also said to be targeting…

  • "New Data Analysis Approach Could Strengthen the Security of IoT Devices"

    It has been discovered that a multi-pronged data analysis approach can strengthen the security of IoT devices. One of the data analysis techniques the researchers applied during the study was an open-source freely available R…

  • "NIST is Hunting for Tech to Secure the Energy Sector’s Network"

    Efforts are being made by the U.S. National Institute of Standards and Technology's (NIST)  National Cybersecurity Center of Excellence (NCCoE) to bolster the security of the Industrial Internet of Things (IIoT) attached to the nation's power grid.…

  • "NIST and Microsoft Partner to Improve Enterprise Patching Strategies"

    Microsoft and the U.S. NIST National Cybersecurity Center of Excellence (NCCoE) will team up to help enterprises improve their security patch management strategies. Better patching strategies could have reduced the impact of WannaCry and NotPetya.…

  • "BitPaymer Ransomware Attackers Exploit Apple Flaw to Bypass Detection"

    A zero-day flaw in iTunes for Windows and iCloud for Windows has been patched by Apple. The actual bug was contained by Bonjour, a component that comes with iTunes for Windows machines used to deliver updates and help services discover each other.…

  • "Attackers Hide Behind Trusted Domains, HTTPS"

    A new report from Webroot brings further attention to the use of HTTPS domains to host phishing attacks. Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP that uses the Transport Layer Security (TLS) protocol to secure connections…

  • "Combination of Techniques Could Improve Security for IoT Devices"

    A team of researchers at Penn State World Camp have developed an approach consisting of a combination of different techniques to bolster the security of Internet of Things (IoT) devices such a smart TVs, smart speakers, wearables, and home video cameras…