News
-
"Flaws in Critical-Infrastructure Software Could Have Meant Catastrophe"Security researchers from Tenable discovered vulnerabilities in two widely used critical-infrastructure software programs made by Schneider Electric. The software programs are commonly used at manufacturing sites, solar power facilities, power plants,…
-
"This Malware Checks Your System Temperature to Sidestep Sandboxing"GravityRAT is a Trojan that is able to circumvent research efforts through the performance of thermal readings. The Trojan checks the temperature of systems in order to detect the operation of virtual machines (VM) used for sandboxing. This article…
-
"Car Hackers Find Remotely Exploitable Vulnerabilities in Volkswagen and Audi Vehicles"Multiple vulnerabilities have been discovered in Volkswagen and Audi vehicles. According to security researchers from Computest, the exploitation of these vulnerabilities could allow hackers to listen in on drivers and perform real-time car tracking…
-
"How Hackers Could Cause Chaos on America's Roads and Railways"The Colorado Department of Transportation faced ransomware attacks earlier this year, which had a significant impact on the agency's operations. These cyberattacks highlight the importance of strengthening cybersecurity protections for transportation…
-
"Cybersecurity Teams That Don't Interact Much Perform Best"A recent study conducted by Army scientists indicates that successful high-performing cybersecurity teams have fewer interactions among team members. The observation was made from the study of how cyber defense teams coordinated and performed in…
-
"Emerging Memory Devices Used to Develop Electronic Circuits for Cybersecurity Applications"Dmitri Strukov, a computer science professor at UC Santa Barbara, and his team are working to strengthen the security of IoT devices through the implementation of a chip that utilizes ionic memristor technology. The use of this technology prevents the…
-
"How Microsoft, Amazon, Alphabet Are Reshaping Security"Tech giants, Microsoft, Amazon, and Alphabet, are expected to significantly alter the cybersecurity landscape. The shift will derive from the implementation of security surrounding the cloud. This article continues to discuss how Microsoft, Amazon…
-
"DHS Plans To Formalize Bug Disclosure Policy"The Department of Homeland Security (DHS) is working to establish a clearer process for ethical hackers to follow in the disclosure of hackable vulnerabilities found to be contained by the department’s systems. In addition to formalizing a policy for…
-
"Disguising Access Patterns to Protect Sensitive Data in the Cloud"Sensitive data stored in the cloud can be encrypted, but the way in which it is accessed by users can still leave it vulnerable to hackers. Wensheng Zhang, an associate professor of computer science at Iowa State University highlights the possibility of…
-
“Unsurprisingly, Most Won’t be Ready for GDPR on 25th May”With the deadline fast approaching, according to WinMagic, nearly half of all IT Decision Maker’s surveyed recently do not have all of the systems in place for GDPR compliance. Failing to meet the GDPR requirements will result in hefty fines, up to…
-
“UK Finance Firms Urged to Work Together to Fight Cyber Crime”According to a report written by KPMG and UK Finance, firms in the UK are being urged to pool resources in order to better fight cyber crime in the financial sector. The report also states cyber crime is now the second largest issue in the financial…