News
-
"Fileless Malware Attacks Hit Milestone in 2017"According to Carbon Black’s 2017 Threat Report, there has been a significant increase in fileless malware attacks as they account for the majority of cyberattacks in 2017. Fileless malware attacks require less steps to be deployed and use native…
-
"NTU Study Says Hackers Can Use Sensors in Your Smartphone to Crack Pin"A study conducted by researchers at Nanyang Technological University, Singapore reveals that sensors within smartphones could be used by hackers to crack user PIN codes. Researchers were able to crack PIN codes on some Android smartphones through the use…
-
"Massive Leak Exposes Data on 123 Million US Households"Security researchers at UpGuard revealed that information on 123 million American households was leaked as a result of an unsecured cloud-based data repository from marketing analytics company Alteryx. The Alteryx database exposed a variety of different…
-
"Proof of Randomness Builds Future of Digital Security"A method has been developed by researchers at Princeton University to validate the strength of random number generators that are relied upon by most encryption systems in order to generate cryptographic keys. Vulnerabilities within random number…
-
“Why Defense in Depth Must Include Secure Messaging”Federal, state, and local government agencies continue to experience cyber incidents at a significantly higher rate than industries within the private sector as a result of slow digital transformation. Email phishing is still the most used threat vector…
-
“AI Should Not Replace Tried-and-True Security Practices”Federal government agencies are making use of artificial intelligence (AI) and machine learning to strengthen the U.S.’s cybersecurity. AI lessens many of the challenges faced by agencies in managing massive amounts of data and network traffic by…
-
"New AI Method Keeps Data Private"Researchers at the University of Helsinki, Aalto University, and Waseda University of Tokyo have developed a new privacy-aware machine learning method. According to researchers, this method ensures that information on each data subject of a machine…
-
"Electromagnetic Emissions From Smartphones Analyzed for Security Vulnerability"A new tool is being developed by researchers at UC3M and the CSIC (Spanish National Research Council) to determine whether the electromagnetic emissions from smartphones poses a risk to the security and privacy of users. The electromagnetic…
-
"Consumers Are Ready to Say Goodbye to Passwords"A Visa survey conducted by AYTM Market Research indicates strong consumer interest in new biometric technologies to ease the processes of authentication and payment. A considerable majority of the 1,000 Americans that participated in the survey, show…
-
Mirai Botnet, Case ClosedWired has published an article detailing the life the Mirai Botnet. The one really noteworthy aspect of this is that it appears to be a complete story. It's not so much the technical aspect. But the botnet writers were caught, prosecuted by the feds and…
-
"New Spider Ransomware Comes With 96-Hour Deadline"A new strain of ransomware by the name of Spider was found by Netskope Threat Research labs. This ransomware was discovered to have targeted victims in Balkans through the launch of an email phishing campaign that distributes malicious Office…
-
New National Security StrategyThe White House released a new National Security Strategy. The key relevance here is that Cyber is one of the goals to keep America safe. It starts off with how cyber is important. The Priority Actions are: