News
-
"Adaptive cyber security decision support to prevent cyber attacks"The University of Nottingham is leading the development of a new system, which will be in support of organizations in the maintenance of sufficient cybersecurity levels. The digital ‘Online Cyber Security System’ decision support service (OCYSS) is the…
-
"8 Things Every Security Pro Should Know About GDPR"The European Union’s General Data Protection Regulation (GDPR) will be executed on May 25, 2018, therefore any organizations or entities that handle personal data belonging to EU residents must be prepared to fully comply with the rules of this decree.…
-
"Magic Wormhole: Enthusiast develops super-secure way to transmit files from one PC to another"A group of software developers and cybersecurity buffs have developed a new technique of transferring files between computers that eliminates the need for any intermediate tool such as a USB memory stick, portable hard drive, email, or other third-party…
-
"How blockchain-based apps and sites resist DDoS attacks"Distributed Denial-of-Service (DDoS) attacks are expected to increase in frequency and sophistication, especially with the growing use of interconnected and unsecure IoT devices. The largest DDoS attack on record, targeted security news site,…
-
"Researchers Claim Petya Outbreak Was Disguised Wiper Attack"According to researchers, Matt Suiche of Comae Technologies and Juan Andres Guerrero-Saade of Kaspersky Lab, the Petya attack may actually be a “wiper” malware masquerading as ransomware. This assessment changes the intent of the attack as a wiper…
-
"Researchers demonstrate new firewall that protects cellphones from security threat"Security researchers at Ben-Gurion University of the Negev have introduced a new firewall, which serves to detect malicious code and deliver a level of security that has been absent from Android cellphones. Research behind the development of this…
-
"Even weak hackers can pull off a password reset MITM attack via account registration"Researchers from the College of Management Academic Studies have shared their findings of a new technique in which an attacker could perform a password man-in-the-middle attack with the exploitation of password reset procedure vulnerabilities during the…
-
"Vaccine, not Killswitch, Found for Petya (NotPetya) Ransomware Outbreak"Amit Serper, a security researcher at Cybereason, has developed a vaccine to prevent the infection of the Petya ransomware on a computer. Though the method presented does not act as a kill switch to stop the global spread of this ransomware, it does stop…
-
"New Petya Ransomware Attack Moving Laterally to Exploit Users"The global outbreak of the Petya ransomware cyberattack continues as organizations are still being hit, more so in the Ukraine than in the U.S. It has been discovered that the Petya ransomware attack was initiated by the ExternalBlue exploit within…
-
"Microsoft is building a smart antivirus using 400 million PCs"As the frequency and complexity of cyberattacks rises, Microsoft plans to implement artificial intelligence into the next generation of antivirus software. In preparation of future global malware outbreaks, Microsoft will be releasing an update to…
-
"Researchers Found They Could Hack Entire Wind Farms"Researchers from the University of Tulsa have discovered that wind farms are susceptible to being hacked with the use of a Raspberry Pi minicomputer. With the authorization of wind energy companies, these researchers have conducted a number of…
-
"Intel teams up with Israeli cybersecurity incubator to foil hacking attacks"The collaboration between Intel, the largest chip-maker in the world, and Israeli cybersecurity incubator, Team8, has been announced. This collaboration is in support of developing and locating advanced technology to avoid complex cyberattacks. In…