News
-
"Researchers Propose Scheme to Secure Brain Implants"A method has been proposed by researchers from KU Leuven, Belgium, that would strengthen the security of implantable neurostimulators. According to researchers, the communications between the neurostimulator and its external device programmer lacks…
-
"The Public Has a Vital Role to Play in Preventing Future Cyber Attacks"An extensive hacking incident recently occured in which a signifiant number of Australian organizations were affected. The attack highlights the importance of taking on stronger approaches to defending against cyberattacks and educating the…
-
"First Public Demo of Data Breach via IoT Hack Comes to RSAC"A demonstration performed by security researchers at the 2018 RSA Conference shows a way in which novice attackers could compromise an IoT device and steal personally identifiable information. The demonstrated attack could be performed without…
-
“Trustjacking exploit abuses iTunes feature to spy on iOS devices”Symantec researchers at RSA 2018 have disclosed a technique dubbed “Trustjacking”. The technique allows attacker to spy on and gain control of devices via the Wi-fi sync feature in iTunes. This article further discusses Trustjacking, Apple’s response to…
-
“Google’s Project Zero Exposes Unpatched Windows 10 Lockdown Bypass”Researchers at Google’s Project Zero have released information and proof-of-concept for a bypass that affects Windows 10 S and 10 users with user mode code integrity enabled. Microsoft and Google are currently working toward finding a solution. This…
-
“DHS Prepares Cross-Sector Strategy to Limit Domino Effects from Big Cyberattacks”A new cyber strategy will be released by the Department of Homeland Security, which aims to alleviate the domino effects of cyberattacks on critical infrastructure sectors and government agencies. The strategy will also help to improve the security…
-
“70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks”Tripwire conducted a survey to which 151 IT and operational technology (OT) security professionals at energy, oil, and gas companies responded. An overwhelming majority of respondents expressed concerns surrounding the shutdown of operations and…
-
“This Ransomware Was Rewritten to Mine Cryptocurrency - and Destroy Your Files”Researchers at Trend Micro have discovered cryptocurrency-mining malware that appears to be rewritten from a form of ransomware called XiaoBa. In addition to performing unauthorized cryptocurrency mining, the malware also ruins users’ applications and…
-
"Intel Unveils New Threat Detection Technology"Intel recently announced the launch of two new technologies, Threat Detection Technology and Security Essentials. The Threat Detection Technology will improve upon the efficiency of scanning for cyberthreats, while Security Essentials will…
-
"Real-Time Detection of Consumer IoT Devices Participating in DDoS Attacks"Researchers from Princeton University have presented a way in which hacked consumer IoT devices being used to conduct DDoS attacks could be detected in real-time. A system designed by researchers to operate on network middleboxes, executes tasks such as…
-
"Developing Secure Mobile Apps"Mobile devices have become an essential part of our personal and professional lives. However, mobile applications are still vulnerable to attacks such as ransomware, spyware, and more. As mobile devices store personal data, it is crucial that mobile…