News
-
"Bypassing Popular Passwords"A new model for password protection has been proposed by Jaryn Shen and Qinqkai Zeng of the State Key Laboratory for Novel Software Technology, and Department of Computer Science and Technology, at Nanjing University, China. The new approach is aimed to…
-
"The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors"There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017. It has jumped from 15 percent to 26 percent, and the results might actually be greater, because most organizations…
-
"Critical flaw allows attackers to take over Cisco Elastic Services Controllers"Cisco had a critical flaw which allowed attackers to take over Cisco Elastic Services Controllers (ESC). ESC is a popular enterprise software for managing virtualized resources. The vulnerability is due to improper validation of API requests.…
-
"Flaws in Metrics for User Login Systems"A study conducted at Rutgers University-New Brunswick brings further attention to flaws in the metrics used to measure the performance of user login systems. In addition to highlighting these flaws, the study proposes a solution towards measuring the…
-
"Unhackable? New chip makes the computer an unsolvable puzzle"A new computer processor architecture called MORPHEUS could usher in a future where computers proactively defend against threats. It would be able to render the current electronic security model of bugs and patches obsolete. …
-
"Industry Warns of Flaws as Gov’t Proposes Mandatory IoT Security Labelling"The UK government is considering establishing an IoT security labelling scheme, which will help inform consumers about how secure IoT products are. The consultation suggests three security requirements laid out by the UK government's "Secure by Design"…
-
"50,000 Companies Exposed to Hacks of 'Business Critical' SAP Systems: Researchers"New ways of exploiting vulnerabilities in SAP software have been discovered by security researchers. These vulnerabilities leave the 50,000 companies that use this software susceptible to being hacked. The exploitation of these vulnerabilities could…
-
Executive Order on America’s Cybersecurity WorkforceThe White House released an Executive Order on America's Cybersecurity Workforce. It call this workforce a national asset. It calls for the government to enhance mobility of the workforce to move between public and private employment. It call for…
-
"Majority of Encrypted Email Clients Vulnerable to Signature Spoofing"Researchers from the Ruhr University Bochum and Munster University of Applied Sciences examined the implementation of two major email encryption standards, OpenPGP and S/MIME. According to the findings of this analysis, the majority of leading encrypted…
-
"GAO Flags New Cybersecurity Issues for Upcoming Census"The Government Accountability Office (GAO) urges the Census Bureau to improve upon its cybersecurity. The public will be allowed to respond to the 2020 Decennial Census via the internet. In addition, field-based enumerators will be allowed to use…
-
"Can Wi-Fi Networks Be Completely Secure?"Researchers in China have reviewed different Wi-Fi hacking techniques that attackers have been discovered to use and suggested ways in which the security of a wireless infrastructure can be improved. Rogue AP, ARP spoofing, and Wi-Fi MITM are three of…
-
"How much does the average employee know about data privacy?"The 2018 Eye on Privacy report found that 58 percent of employees had never heard of the PCI Standard. PCI Standards are a global set of payment card industry (PCI) guidelines that govern how credit card information is handled. It was…