News
  • "To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers"
    Recent claims surrounding the infiltration of the U.S. technology supply chain by China's military to conduct espionage call for public and private sector organizations to take further action to reduce IT supply chain risks. Organizations are urged to…
  • "Blockchains in Real Time"
    Sebastian Faust, Professor of Applied Cryptography, and his team of cryptography researchers at Darmstadt University of Technology are working to improve the performance of blockchain transaction processing while also ensuring the security of blockchain…
  • "New Variant of Mirai Malware Exploits Weak IoT Device Passwords to Conduct Brute-Force Attacks"
    Security researchers at Trend Micro have uncovered a new variant of Mirai malware, called Miori. Miori is delivered through the exploitation of a remote code execution (RCE) vulnerability contained by the ThinkPHP programming framework. This article…
  • "Five Emerging Cyber-Threats to Worry About in 2019"
    2018 was an eventful year in regard to cybersecurity disasters such as large-scale data breaches, ransomware attacks, and the discovery of major security vulnerabilities contained by microchips. There are new threats that cyber defenders should be…
  • "From Encrypting the Web to Encrypting the Net: 2018 Year in Review"
    Great improvements were made in 2018 pertaining to web encryption. A significant number of websites have adopted HTTPS (Hyper Text Transfer Protocol Secure) due to the efforts of the Electronic Frontier Foundation (EFF), Google, and more. EFF will…
  • "Hacking Attacks on Your Router: Why the Worst Is yet to Come"
    Attacks on home and office routers are expected to increase in complexity and severity. Users are encouraged to update their router firmware, change default passwords, and more. This article continues to discuss notable attacks on routers in 2018,…
  • "PewDiePie Hackers Take Aim at Chromecast TVs"
    The two hackers that were able to hijack poorly secured printers to print messages aimed at promoting a popular YouTuber are now targeting Chromecast TVs. Routers with the Universal Plug and Play (UPnP) protocol enabled were exploited to take…
  • "Proofpoint Warns of Custom Web Font Phishing Technique"
    A new technique has been discovered by researchers at Proofpoint, which allows phishing web pages to go undetected. Custom web font files can be used by cybercriminals in the creation of phishing web pages to apply a substitution cypher, which can…
  • Pub Crawl #22
     
  • "University of Maryland Researchers Beat Google’s reCaptcha Audio Challenge"
    Researchers from the University of Maryland were able to defeat Google's reCaptcha audio challenge through the use of a tool that they have created, called unCaptcha 2. The audio challenge presented by the security feature was broken by researchers…
  • "Newspaper Production Hit by Ryuk Ransomware Attack"
    Ryuk ransomware is suspected to be behind the disruption of the production of major U.S. newspapers. The ransomware impacted the delivery and printing of newspapers owned by Tribune Publishing. This article continues to discuss the cyberattack that…
  • "Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3"
    Security researchers have demonstrated the vulnerability of cryptocurrency wallets, including include Trezor One, Ledger Blue, and Ledger Nano S, to being hacked. According to the researchers, the vulnerabilities contained by these cryptocurrency…