News
-
"Cloud Security Spending Set to Top $12bn by 2023"A greater amount of companies are starting to use cloud services. Organizations spent $178 billion on public cloud services last year, and the amount of money spent on public cloud services is expected to grow to $236 billion by…
-
"Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support"Microsoft has confirmed that some of its email service users were the targets of an attack sometime between January 1st and March 28th. Hackers were able to access the contents of users' email accounts through the abuse of Microsoft's customer…
-
"Researchers in Singapore Demonstrate New Quantum Key Distribution Technique over Singtel's Fibre Network"A breakthrough in quantum key distribution (QKD) has been made by a team of researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. QKD differs from traditional encryption in that it is uses the laws…
-
"Experts Explore Mystery of Security Metrics"The AFCEA Cyber Committee explored the area of security metrics by surveying and interviewing organizations with cybersecurity programs. The results from these surveys and interviews further highlight that measuring the adequacy of cybersecurity…
-
"New Attacks (and Old Attacks Made New)"In todays world new malware and zero-day attacks are reasonably rare and are vastly outnumbered by reconfigured malware and the regular return of old attacks. It is important to be prepared for the new attacks, however it is also very important to…
-
"Aftershock-3PC: Polymorphic Malware Attack on 200+ Premium Publishers"A new form of malware targeting ad networks, called AfterShock-3PC, is said to have been designed to circumvent signature-based detection in that it continuously alters its identifiable features. According to the Digital Security and Operations (DSO)…
-
"TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids"Researchers at Pen Test Partners have uncovered vulnerabilities contained by a popular Australian smartwatch for kids, called TicTocTrack. Parents can track the location of their children via the smartwatch. According to researchers, the vulnerabilities…
-
"Privacy 'Poisoning' Poses Threat to Companies Using Blockchain"Blockchain technology can be made unusable through the launch of a privacy poisoning attack. A privacy poisoning attack is a new kind of cyberattack that can be performed by loading private data such as names, home addresses, credit card numbers, and…
-
"Cyber security – should your business be worried?"Every business no matter how big or small relies on computers and digitalization to perform their basic functions. If a company is breached, then it can cost a lot of money for the company to fix and mitigate the affect of the attacks. Every…
-
"DHS Alerts Industry to Insecure Enterprise VPN Apps"The Department of Homeland Security (DHS) recently issued an alert to the public pertaining to the presence of a vulnerability in virtual private network (VPN) applications made by Cisco, F5 Networks, Palo Alto Networks, and Pulse Secure. According to…
-
"Report: Healthcare Is No. 1 - For Breaches"Healthcare organizations are ranked number one when it comes to being affected by breaches. Once an attacker gained access to a device or an account, the most common next steps were accessing an Office 365 account (34 percent); roaming the network…
-
"The Cybersecurity Workforce Shortage Is a Big Problem. You Can Help Girl Scouts Solve It."In support of closing the cybersecurity workforce gap, the Girl Scouts launched a program aimed at strengthening the cybersecurity skills of young girls. Within the first six months of the program, 44,000 cybersecurity badges were earned by girls in…