-
"Billions of Malicious Bot Attacks Take to Cipher-Stunting to Hide"In addition to the growing advancement of malware development, cybercriminals are also increasing the complexity of the ways in which they evade detection. According to researchers at Akamai, attackers have been observed to be increasing their use of a…
-
"CyberPatriot Competitions Offer Answers to U.S. Cybersecurity Workforce Challenges"A section in the new Executive Order on America's Cybersecurity Workforce calls for the establishment of more cyber competitions in support of raising awareness about the cybersecurity field, cultivating cyber skills, and sustaining a national…
-
"Before Blaming Hackers, Check Your Configurations"Widely-used cloud platforms, such as Office 365 from Microsoft or G-Suite from Google are often administered by IT professionals tasked with all aspects of configuration; security is not their primary focus. Most Software as a Service (SaaS), have …
-
"How AI Augments Mobile Authentication"The U.S. Department of Defense recently awarded a 20-month $2.42 million contract to a company, named TWOSENSE.AI, in support of developing technology that uses artificial intelligence (AI) to learn about mobile users' behavior and continuously…
-
"A Cisco Router Bug Has Massive Global Implications"Security researchers at Red Balloon have discovered two vulnerabilities in the Cisco 1001-X series router. Cisco's 1001-X routers are used for connectivity at stock exchanges, local malls, corporate offices, and more. The exploitation of these security…
-
"Why Local Governments Are a Hot Target for Cyberattacks"Cyberattacks against local governments have been on the rise as indicated by the recent wave of ransomware attacks faced by municipalities within the U.S. Security experts have provided reasons as to why local governments have become an attractive target…
-
"Employees are aware of USB drive security risks, but don’t follow best practices"In a study that was conducted, employees were found to be aware of the risks associated with inadequate USB drive security. It was found that while 91 percent of respondents claimed that encrypted USB drives should be mandatory, 58 percent of…
-
"Intel CPUs Impacted by New Zombieload Side-Channel Attack"A team of researchers have recently disclosed a new side-channel attack, called Zombieload. This attack is of the same category as Meltdown, Spectre, and Foreshadow in that it also abuses the speculative execution capabilities of modern CPUs to gain…
-
"Design Flaws Create Security Vulnerabilities for 'Smart Home' Internet-of-Things Devices"Flaws in the design of smart home Internet of Things (IoT) devices have been discovered by researchers at North Carolina University. The discovery of these design flaws is shared in a paper, titled Blinded and Confused: Uncovering Systemic Flaws in…
-
"WhatsApp flaw used to install spyware by simply calling the target"A security vulnerability in the popular Facebook-owned end-to-end encrypted messaging app WhatsApp allowed attackers to install spyware on smartphones without any user interaction or knowledge. WhatsApp discovered the vulnerability in early May, and…
-
"Flaws in a Popular GPS Tracker Leak Real-Time Locations and Can Remotely Activate Its Microphone"Security vulnerabilities have been discovered in a popular GPS tracker used to monitor children, track vehicles, and send alerts pertaining to elderly patients. The white-label location tracker is manufactured in China and is sold by companies, including…
-
"Hackers Still Outpace Breach Detection, Containment Efforts"Reports recently released by security researchers, including the Trustwave 2019 Global Security Report and the FireEye 2019 Mandiant M-Trends Report, indicate that there has been an improvement in the discovery and containment of data breaches as…
News