News
-
"A Model Hospital Where the Devices Get Hacked—on Purpose"A mock hospital, called the Medical Device Village, will be set up at the 2019 DefCon hacking conference. The model hospital will consist of various medical devices, including pacemakers, insulin pumps, and other gadgets that one would find in an actual…
-
"New Windows Malware can Also Brute-Force WordPress Websites"A new malware strain has been discovered named Clipsa. Clipsa has been affecting users for the past year and has affected users all over the world. This malware is different from most forms of malware mainly because it can conduct brute-…
-
Summer Internship at NSA in Science of SecurityThe National Security Agency is currently taking applications for internships in the summer 2020 for its Summer Program in Science of Security. Applications are being accepted until October 15, 2019.
-
"From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise"According to a report recently released by IBM X-Force Incident Response and Intelligence Services (IRIS), there has been a significant increase in destructive attacks against organizations. These attacks aim to paralyze organizations by deleting data,…
-
"Connected Cars Could be a Threat to National Security, Group Claims"Consumer Watchdog (CW) has released a new report, titled Kill Switch: Why Connected Cars Can be Killing Machines and How to Turn Them Off, which highlights the threat posed by connected vehicles to national security. While connected vehicle technologies…
-
"Romance Scams Soar as Victims Become Unwitting Money Mules"It has been discovered that losses from romance scams soared by over 71% from 2017-18. Victims of romance scams are increasingly recruited as money mules. In 2017 15,000 victims reported romance and confidence scams, and cost the victims 211…
-
"Vital Infrastructures in the Netherlands Vulnerable to Hackers"A new report, titled Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands, recommends that vital infrastructure is protected differently as a result of the significant consequences that could occur when hackers attack…
-
"New Tool Could Reduce Security Analysts' Workloads by Automating Data Triage"A new tool aimed at improving the performance of security analysts has been developed by researchers at Penn State and the U.S. Army Research Office. The tool reduces security analysts' workloads by automatically assigning degrees of urgency to…
-
"New Dragonblood Vulnerabilities Found in Wi-Fi WPA3 Standard"Earlier this year, security researchers named Mathy Vanhoef and Eyal Ronen uncovered critical design flaws in the Wi-Fi security and authentication standard, Wi-Fi Protected Access 3 (WPA3), which they dubbed Dragonblood vulnerabilities. Vanhoef and…
-
"Cyberattacks Against Industrial Targets Have Doubled Over the Last 6 Months"It has been discovered that cyberattacks designed to cause damage have doubled in the past six months, and 50 percent of organizations affected are in the manufacturing sector. IBM reports that during the first half of 2019 the use of …
-
"Warning over Boom in Web Skimming Cyber Crime Targeting Online Stores"The security firm, Malwarebytes, has issued a warning to ecommerce companies about an increase in Magecart attacks that target online payments systems. Magecart is made up of sophisticated hacking groups that perform web-based card-skimming attacks to…