News
-
"EU's GDPR: What Will American Companies Have To Do To Comply?"Starting in the Spring of 2018, the European Union’s General Data Protection Regulation (GDPR) will be in effect. The objective of the GDPR is to strengthen the protection of data belonging to citizens within the EU. However, this regulation will have an…
-
"Applied cybersecurity research for better protection of critical national infrastructure sectors"Cyber Apex Solutions, LLC, has been awarded a five-year Other Transaction Agreement (OTA) with a maximum value of $70 million by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to aid applied research of prototype…
-
"Hackers accidentally create network-busting malware"Arbor Networks has presented new details of the latest variant of the Mirai botnet, which has been designed to exploit IoT devices in one network to launch attacks on another. It has been revealed by researchers that this variant could knock networks…
-
"Creating a Common Language Of Cybersecurity"In support of creating a common language for the management and reporting of cyber threats to government organizations and industries, the Office of the Director of National Intelligence is developing standard definitions to improve the communcation and…
-
"The National Crime Agency is sending hackers to rehab"The National Crime Agency has developed a cyber-rehabilitation program for young hackers in hopes of encouraging the use of such skills for good. The first two-day camp of the “Prevent” program was held in July with all attendees being perpetrators of…
-
"Homograph attacks: Don’t believe everything you see"ESET security researchers have brought attention to homograph attacks, which could potentially pose significant threats to users as it advances the act of spoofing. Fraudulent websites can be designed to appear secure as attackers could convert the…
-
"House Panel Passes Bills to Reorganize DHS Cyber Team and Collect Zero-Day Info"The U.S. House Committee on Homeland Security passed two bills that aim to restructure the Department of Homeland Security’s (DHS) cybersecurity operations and establish a report on practices performed by the government in the process of…
-
"How one small hack turned a secure ATM into a cash-spitting monster"IOActive researchers have demonstrated the possibility of a hacker infiltrating an ATM machine to exploit a vulnerability, which could allow all of the money within the machine to be dispensed until complete depletion. This demonstration highlights the…
-
"Industroyer malware a turning point for ICS security"Security researchers have shared further analyses of the “Industroyer” malware that targeted Ukraine’s power grid in December 2016. Researchers from ESET and Dragos, Inc., have shared their research in a presentation at Black Hat, in which they…
-
"New Form of Cyber-Attack Targets Energy Sector"Energy companies are being targeted by a new form of spear-phishing attack. CyberInt has discovered this attack to be difficult to detect as the distributed “lure” email consisting of an attached Word document does not contain any malicious code, making…
-
"Bot vs Bot in Never-Ending Cycle of Improving Artificial intelligence"The utilization of artificial intelligence through the implementation of machine learning is expected to defeat the attacks of malware and hackers by many in the cybersecurity field, however others believe this technology does not offer the ultimate…
-
"10 Critical Steps to Create a Culture of Cybersecurity"Although incidents of cyberattacks targeting organizations are constantly headlined to promote awareness of such attacks, many businesses still lack sufficient tools and procedures for the protection of their systems and data. Cyber incidents pose major…