News
-
"Threat Intelligence Shows Tried and True Techniques Continue to Work for Hackers"New threat intelligence data shows that phishing and ransomware attacks continue to be largely used by malicious actors. These simple attacks remain highly successful for hackers. This article continues to discuss trends in industry cybercrime, attack…
-
"GDPR Compliance Deadline Still a 'Significant' Challenge for Many"As the enforcement of the European Union’s General Data Protection Regulation (GDPR) closely approaches, organizations are still finding it difficult to comply with the data protection rules of the legislation. Organizations impacted by GDPR are expected…
-
"Not so Safe in the Cloud - a Quarter of Enterprise Hit by Cryptojackers"RedLock recently released its newest Cloud Security Trends report, which reveals a significant increase in cloud cryptojacking attacks faced by enterprises. The report highlights a rise in the unauthorized use of cloud computing resources to mine…
-
SOUPS now accepting submissions for workshopsThe 2018 Symposium on Usable Security and Privacy (SOUPS) is now accepting submissions for workshops to be held August 12, 2018, in Baltimore, MD. Submission deadline is May 25. Workshops include:
-
"Four Cybersecurity Policies Transforming Government"U.S. government agencies will be undergoing a transformation to improve upon their cybersecurity systems and practices in order to reduce cyber risks. There are four cybersecurity policies that will incite this transformation. This article continues to…
-
“Hacking Train Wi-Fi May Expose Passenger Data and Control Systems”The exploitation of vulnerabilities contained by train Wi-Fi networks could allow hackers to access sensitive passenger information and control systems. Sensitive information that could be accessed by hackers include credit card details, names, and email…
-
“Orgs Failing to Identify Insider Threat Blind Spots”Research conducted by Dtex Systems indicates that all organizations have active insider threats. The findings of this research highlights the importance of monitoring user behaviors that create security vulnerabilities within organizations. This article…
-
"Exploiting People Instead of Software: Report Shows Attacker Love for Human Interaction"There has been an increase in the use of social engineering tactics by cybercriminals to launch cyberattacks. According to a report released by Proofpoint called the The Human Factor 2018, cybercriminals and threat actors are using new techniques to…
-
"Microsoft's Latest Excel Update Has Security Pros Anxious"A new Excel feature is raising concerns among security researchers. The new feature enables the execution of custom JavaScript functions in Excel spreadsheets. Although the update expands the capability of Excel, it also creates new paths for attackers…
-
"As Voice Assistants Go Mainstream, Researchers Warn of Vulnerabilities"As the popularity of voice-activated devices rises, concerns surrounding the security of such technology grow. Security researchers have highlighted the vulnerability of voice-activated gadgets through the demonstration of an attack that could allow…
-
"Popular Encrypted Email Standards Are Unsafe: Researchers"Popular PGP and S/MIME email encryption standards have been discovered to contain security flaws. According to researchers, these vulnerabilities could allow the contents of encrypted email communications to be exposed to attackers. This article…