News
-
"Managing IoT Privacy, Cybersecurity Guidance Released by NIST"The National Institute of Standards and Technology (NIST) publication, NISTIR 8228, provides a guide that could be used by federal and private sector organizations in the management of IoT privacy and cybersecurity risks. The report is the first in a…
-
"Disruptive by Design: Intelligence Fusion Inoculates Against Cyber Threats"Cyber intelligence fusion is needed to improve upon the identification of cyber threats and the speed at which risks are mitigated by organizations. The fusion of such intelligence can also help organizations learn from cyber incidents in a…
-
"Payment Fraud Linked to Terrorism and Trafficking"In a new study, it was discovered that payment card fraud is being used around the world to fund and launder the proceeds from organized crime, drug and human trafficking, terrorism and more. Payment fraud caused over 1 billion dollars in losses…
-
"Another Florida City Is Making a Ransomware Payment, Worth Nearly $500,000 This Time"Lake City suffered a ransomware attack that locked the city's phone and email systems. The city made the decision to give into the demands of the hackers by paying them 42 bitcoins, which is equivalent to $490,421. Many businesses often decide to pay…
-
"Hackers Favoring Shimmers Over Skimmers for ATM Attacks"Cybercriminals are now using shimmers more than skimmers in the execution of attacks against automated teller machines (ATMs). Skimmers are small devices that can be attached to an ATM's card reader to harvest data as users swipe their cards, which could…
-
"iOS Devices Compromised Again"The Media Trust Digital Security and Operations team has discovered a new steganography campaign that targets iOS devices. Steganography is a method that can be used by hackers to hide malicious data or malware in or by way of image files, video clips,…
-
"1 in 10 Open Source Components Downloaded in 2018 had a Known Security Vulnerability"In a new study it was discovered that 1 in 10 open source components downloaded in 2018 had known security vulnerabilities. It was discovered that there was a 71% increase in open source related breaches over the past five years, and that…
-
"Bill Advances to Create Vulnerability Disclosure for Federal Internet of Things"Under the Internet of Things Cybersecurity Improvement Act, a vulnerability disclosure process would be established for agencies that discover vulnerabilities in Internet of Things (IoT) devices. The bipartisan bill would also prohibit U.S. government…
-
"Top Roadblocks to Securing Web Applications"Data breaches have become a common occurrence. In Australia, the Australian Information Commissioner (OAIC) found that a data breach affected more than 10 million Australians. This data breach is just one of many that have recently been experienced by…
-
"Report: Security of iOS and Android Mobile Apps 'Roughly Equivalent'"It is widely believed that iOS mobile apps are a lot safer than Android mobile apps. However, in a new study, it was discovered that actually the security of iOS and Android mobile apps are about the same, and that no company has more secure…
-
"Hackers Hit over a Dozen Mobile Carriers and Could Shut down Networks, Researchers Find"Security researchers with Cybereason have identified an advanced, persistent attack, which they have dubbed Operation Soft Cell. The attack is aimed at stealing sensitive data from telecommunications providers located in Europe, Asia, Africa, and the…