News
-
"What’s the Best Approach to Patching Vulnerabilities?"A team of researchers from Cyentia, Virginia Tech, and RAND Corporation recently presented a paper, titled Improving Vulnerability Remediation Through Better Exploit Prediction, in which they discuss their study on strategies for the prioritization of…
-
"UTSA Develops First Cyber Agility Framework to Measure Network Protection over Time"Researchers at the University of Texas at San Antonio developed a quantifiable framework that can be used to measure the agility of cyber attackers and defenders. Through the use of this framework, cyberattacks such as those launched by the major cyber…
-
"DiMe: Calling All Who Serve in Digital Medicine"The growing connectivity of medical devices increases security risks. Collaboration among professionals in different fields is important in the strengthening of medical device security. Technologists, data scientists, clinicians, security researchers,…
-
"Will Biometrics Replace Passwords For Online Payment Authentication?"In a study it was discovered that over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud. The study also discovered that,…
-
"Malboard: New Computer Attack Mimics User’s Keystroke Characteristics, and Evades Detection"Researchers from Ben-Gurion University of the Negev's (BGU) Malware Lab developed a new user keystroke impersonation attack, called Malboard, to demonstrate the possibility of users' keystrokes being mimicked by attackers and the prevention of detecting…
-
"2018 in Numbers: Data Breaches Cost $654 Billion, Expose 2.8 Billion Data Records in the U.S."According to ForgeRock's U.S. Consumer Data Breach Report, 2.8 billion consumer data records were exposed in 2018, which costs U.S. organizations more than $654 billion. Although investments in information security products and services have increased,…
-
"What the Baltimore Ransomware Attack Means for Incident Response Communications"Baltimore has yet to recover from a ransomware attack, which has disrupted resident activities such as paying utility bills, obtaining business licenses, selling homes, and more. Government email accounts and city business functions are still not able to…
-
"Organizations Still Struggle to Manage Vulnerability Patches, Report"The results of a survey conducted by Tripwire to which 340 information security professionals responded, further highlight that many companies still fall short in the management of vulnerability patches. In addition, there is an insufficient visibility…
-
Adware Hidden in Android Apps Downloaded More Than 440 Million TimesIn a study, it was discovered that 238 applications in Google Play hid BeiTaAd, a well-obfuscated ad plugin that could display ads on the device's lock screen, trigger video and audio advertisements while the phone is asleep, and display…
-
"Email Still a Major Attack Vector: Security Research"Email remains one of the main attack vectors used by cybercriminals. Key findings from different research reports, including those released by Mimecast, Proofpoint, Rapid7, Vade Secure, and more, have been highlighted by eSecurityPlanet. According to…
-
"ARCHANGEL: Securing National Archives with AI and Blockchain"Researchers at the University of Surrey have developed state-of-the-art artificial intelligence (AI) technologies and a blockchain aimed at bolstering security for digital government records of national archives. The system, called ARCHANGEL, combines AI…
-
"The Growing Importance of Bio-Cybersecurity"Healthcare systems are offering DNA sequencing as a result of the increased demand for genetic screening by patients. However, as the performance of DNA sequencing grows, the security of patients' genetic data needs to be taken more seriously by…