News
-
“Automated Bots Growing Tool For Hackers”A honeypot experiment carried out by Cybereason reveals the increasing use of automated bots by less-experienced attackers as the availability of such tools continues to grow. These bots could be used by attackers to automate the performance of tasks…
-
"Hack a VR System, Lead a Player Astray? Yes, Say Researchers"A team of researchers from the University of New Haven have highlighted the vulnerability of virtual reality (VR) systems to being hacked. Researchers demonstrated a malware attack on VR systems, HTC Vive and Oculus Rift, in which the view displayed by…
-
"Ransomware Incidents Double, Threatening Companies of All Sizes"Verizon's 2018 Data Breach Investigations Report (DBIR) shared key findings in relation to the perpetrators behind breaches, common types breaches, types of organizations that are most affected by such breaches, and security strategies. According to the…
-
"Researchers Create Malware That Steals Data via Power Lines"Researchers at the Ben-Gurion University of the Negev (BGU) demonstrated the possibility of extracting data from air-gapped computers through the use of power lines. PowerHammer is a technique developed by BGU researchers that could be used to perform…
-
"Army Scientists Uncover How to Stop Cyber Intrusions"A UCLA team of researchers funded by the U.S. Army discovered a signature of Majorana particles, which could be used to protect sensitive communication networks from intruders. The properties contained by Majorana particles could improve upon quantum…
-
"Standards Milestone Could Mark Beginning of End for Passwords"WebAuthn is a new web standard that is close to being approved by the World Wide Consortium, which is designed to replace passwords. The new standard aims to improve upon the security of the Internet for users by allowing the use stronger authentication…
-
"Built-In Security For Auto Chips"Cybersecurity should be considered earlier in the design cycle of autonomous vehicles. The growing advancement and connectivity of electronics and systems built into vehicles, creates vulnerabilities for hackers to exploit. Therefore, the automotive…
-
"NYC Secure Launched: Cybersecurity Initiative to Protect New Yorkers Online"NYC Secure is a cybersecurity initiative recently launched to improve upon the security of New York City residents online. The goal of NYC Secure is to help protect NYC residents from malicious cyber activity on their mobile devices. This article…
-
"Attacker Dwell Time Still Too Long, Research Shows"The time it takes for cybersecurity teams to discover a security intrusion has reduced significantly, however the window of time between initial attack and discovery remains long. According to Mandiant’s 2018 M-Trends report, the average time between…
-
"Cyber Train to Cyber Fight"As the cyberthreat landscape continues to evolve, cyber operators are learning to work in cyberspace, which is still a new domain of warfare. In order to keep up with the growing landscape of cyberthreats facing critical systems within the U.S., training…
-
"This Quantum Random Number Generator Can Never Be Hacked"A new quantum method developed by NIST addresses the challenge of generating true random numbers for the process of encryption. The method generates truly random strings of numbers through the use of entangled photons. This article continues to discuss…
-
"False Software Update Leads Users to Get Bitten by Malware Infection"Security researchers have recently found a campaign to distribute malware via false updates for applications such as Chrome, Firefox, and Adobe Flash. The malware takes advantage of the legitimate remote access tool NetSupport Manager to gain access…