News
-
"Multi-Stage Rietspoof Malware Drops Multiple Malicious Payloads"A new malware family, called Rietspoof, uses multiple stages for delivery, each of which has specific capabilities. Rietspoof has been found to deliver multiple payloads. This article continues to discuss discoveries made by security researchers…
-
"Spectre Bugs Likely to 'Haunt Us for a Long Time' as Software Alone Can't Fix All of Them, Warn Google Researchers"According to Google security researchers, the use of software defenses is not an adequate solution to fixing Spectre vulnerabilities. Spectre attacks abuse the speculative execution capabilities of modern CPUs. Findings of a new study conducted by Google…
-
"China Abandons Cybersecurity Truce With U.S., Report Says""China largely abandoned a hacking truce negotiated by Barack Obama as President Donald Trump embarked on a trade war with Beijing last year, according to the cybersecurity firm Crowdstrike Inc." Bloomberg.com reports: "China Abandons…
-
"Why U.S. Cities Are a Key Target for Cyber Attacks"U.S. cities are attractive targets for hackers as an enormous amount of sensitive information can be accessed through the hacking of a city's network. In addition, the difference in systems, policies, and processes used in a city, make them vulnerable to…
-
"UIC to Lead $3M Initiative to Develop System to Identify, Patch Software Security Holes"A project aimed at developing a system to identify and patch security vulnerabilities in web software will be led by the University of Illinois at Chicago. Through this project, funded by the Defense Advanced Research Projects Agency (DARPA), a system…
-
"Altered Data Sets Can Still Provide Statistical Integrity and Preserve Privacy"The use of synthetic networks has been proposed as a way to satisfy research needs while preserving the privacy of individuals and institutions. Aleksandra Slavkovic, a professor of statistics and associate dean for graduate education, Eberly College of…
-
"2019’s Top Cybersecurity Challenges to Expect""Cybersecurity is going to be of greater interest in 2019 as private cloud, blockchain and Internet of Things (IoT) adoptions are becoming mainstream." Yahoo! News reports: "2019’s Top Cybersecurity Challenges to Expect"
-
"U.S. Senators Announce Federal Cybersecurity Workforce Bills"In an attempt to fill the federal cybersecurity workforce gap, a bipartisan bill, called the Cyber Security Exchange Act, has been introduced by U.S. senators Amy Klobuchar (D-MN) and John Thune (R-SD). The bill would allow the development of a public-…
-
"Trickbot Becomes One of the Most Dangerous Pieces of Modular Malware Hitting Enterprises"A modular malware, called Trickbot, has been upgraded by its creators to steal credentials from commonly used remote access software. In addition, Trickbot is capable of disabling Microsoft’s Windows Defender, stealing passwords from Microsoft Outlook,…
-
"Your Android Phone Can Get Hacked Just by Opening an Image"A new critical security vulnerability has been discovered in the Android operating system framework. This vulnerability could allow attackers to launch malicious code on Android devices via PNG image files. This article continues to discuss how…
-
"Phishing, Humans Root of Most Healthcare Attacks"The Healthcare Information and Management Systems Society (HIMSS) conducted a survey to which 166 U.S. based information security professionals responded. Respondents of the survey cited phishing and human error as the main causes behind the compromise…