-
"Hackproofing Smart Meters"An automated program that will help increase the protection of smart electricity meters and the smart grid against hacking has been developed by cybersecurity researchers from the University of British Columbia. Smart electricity meters are devices used…
-
"FBI Issues Warning on 'Secure' Websites Used For Phishing"The U.S. Federal Bureau of Investigation (FBI) has issued a warning pertaining to the use of TLS-secured websites by malicious actors for the performance of phishing attacks. The warning brings further attention to the false sense of security given to…
-
"Hackers Hid Malware in a Fake Trading App to Steal Your Cryptocurrency"A fraudulent cryptocurrency trading website has been discovered by security researchers. According to security researchers, the fake website was modeled after the cryptocurrency trading platform, Cryptohopper. The imitation Cryptohopper website contains…
-
"Microsoft Wants More Security Researchers to Hack Into Its Cloud"Microsoft seeks to improve the security of its cloud computing service, Azure, as the company is encouraging security researchers to probe the cloud service for vulnerabilities. White Hat hackers are being asked to find flaws in Azure for Microsoft to…
-
"Is there a weak link in blockchain security?"Recent research revealed that blockchain is set to become ubiquitous by 2025. Blockchain technology is set to provide greater transparency, traceability and immutability, allowing people and organizations to share data without having…
-
"What’s the Best Approach to Patching Vulnerabilities?"A team of researchers from Cyentia, Virginia Tech, and RAND Corporation recently presented a paper, titled Improving Vulnerability Remediation Through Better Exploit Prediction, in which they discuss their study on strategies for the prioritization of…
-
"UTSA Develops First Cyber Agility Framework to Measure Network Protection over Time"Researchers at the University of Texas at San Antonio developed a quantifiable framework that can be used to measure the agility of cyber attackers and defenders. Through the use of this framework, cyberattacks such as those launched by the major cyber…
-
"DiMe: Calling All Who Serve in Digital Medicine"The growing connectivity of medical devices increases security risks. Collaboration among professionals in different fields is important in the strengthening of medical device security. Technologists, data scientists, clinicians, security researchers,…
-
"Will Biometrics Replace Passwords For Online Payment Authentication?"In a study it was discovered that over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud. The study also discovered that,…
-
"Malboard: New Computer Attack Mimics User’s Keystroke Characteristics, and Evades Detection"Researchers from Ben-Gurion University of the Negev's (BGU) Malware Lab developed a new user keystroke impersonation attack, called Malboard, to demonstrate the possibility of users' keystrokes being mimicked by attackers and the prevention of detecting…
-
"2018 in Numbers: Data Breaches Cost $654 Billion, Expose 2.8 Billion Data Records in the U.S."According to ForgeRock's U.S. Consumer Data Breach Report, 2.8 billion consumer data records were exposed in 2018, which costs U.S. organizations more than $654 billion. Although investments in information security products and services have increased,…
-
"What the Baltimore Ransomware Attack Means for Incident Response Communications"Baltimore has yet to recover from a ransomware attack, which has disrupted resident activities such as paying utility bills, obtaining business licenses, selling homes, and more. Government email accounts and city business functions are still not able to…
News