News
-
"Texas Passes First Grid Protection Bills to Boost Cybersecurity Monitoring and Best Practices"Two grid protection bills, Senate Bill 475 and Senate Bill 936, were recently passed by Texas lawmakers. These bills are in support of improving upon the sharing and implementation of best security practices and creating a framework for collaboration in…
-
"Web App Vulnerabilities Flying Under Your Radar"Shandon Lewis, a senior Web application penetration tester at Backward Logic gave a presentation, titled Vulnerabilities in Web Applications That Are Often Overlooked, in which he highlighted the importance of concentrating on small Web application…
-
"General Data Protection Regulation (GDPR): What You Need to Know to Stay Compliant"The General Data Protection Regulation (GDPR) aims to protect the personal data and privacy of EU residents. This regulation is extensive as any company that stores or processes data belonging to EU residents are expected to comply with it. In compliance…
-
"When it comes to email-based threats, Emotet dominates"Emotet has displaced credential stealers, stand-alone downloaders and RATs and has become the most prominent threat delivered via email. During a study of Q1 2019, it was found that 61 percent of all malicious payloads distributed via…
-
"One Million Devices Open to Wormable Microsoft BlueKeep Flaw"Security researchers discovered a critical remote code-execution Microsoft flaw, called BlueKeep, that could be as impactful as WannaCry and NotPetya. Although the flaw has been fixed, researchers have warned that one million public internet-connected…
-
"The Pentagon is Trying to Secure Its Networks Against Quantum Codebreakers"Quantum computers are expected to be capable of breaking current encryption systems, including those used by the government. Therefore, it is essential that new encryption techniques are further explored and developed. The Defense Information Systems…
-
"Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research"According to researchers at Cambridge University, unique device fingerprints could be generated by attackers through the use of motion sensors built into mobile devices, allowing users to be tracked across the internet via their iOS and Android devices.…
-
"Solving the network visibility problem with NaaS"Network visibility is important to an organization. In order to achieve network visibility one should do the following things. First, one should clearly map out their network and network endpoints. Secondly, one should conduct a survey of…
-
"As Bitcoin Surges, Hackers Rush to Spread Cryptocurrency Malware on Google Play"There has been a revival in cryptocurrency malware in response the increased price of Bitcoin. ESET security researchers found two fake cryptocurrency apps on Google Play, called Trezor Mobile Wallet and Coin Wallet. According to researchers, these apps…