News
  • "Researchers find gaps in IoT security"
    Researchers at the University of Michigan and Stony Brook University have shared a new approach to tackling challenges in the security of IoT. This approach to identifying gaps and solving problems in the security of IoT, applies current security…
  • Prof Angela Sasse at InfoSecurity Europe 2017
    Professor Angela Sasse, who is well familiar to the Science of Security community was recently a keynote speaker at InfoSecurity Europe 2017. During her talk she honed into the idea of the importance of usable security. "If security doesn't work for…
  • "Preventing 3D printing hacks"
    The market for Additive manufacturing (AM), also known as 3D printing, is growing rapidly and is expected to continue growing into the future, however concerns over the cybersecurity of this technology is also growing. These growing concerns pertain to…
  • "Cybersecurity researchers claim every network router at risk of secretly leaking data"
    Researchers at Ben-Gurion University of the Negev (BGU) have discovered the possibility that any common network router could covertly leak sensitive information, including passwords and company data. They have demonstrated this possibility through…
  • "QakBot Returns, Locking Out Active Directory Accounts"
    QakBot malware, which surfaced in 2009, has returned and is now behind the lockouts of Microsoft Active Directory accounts. The Active Directory is a centralized system, which allows administrators to control networks as well as manage the authentication…
  • "Fireball – The Chinese Malware of 250 Million Computers Infected"
    Malware by the name of “Fireball” has recently been discovered by Check Point Threat Intelligence and research teams, which has infected over 250 million computers globally. The malware infiltrates and manipulates users’ browsers and web-traffic to…
  • "International data privacy laws create inconsistent rules"
    China’s new data privacy law went into effect on June 1, 2017. While this new regulation primarily rules over network operators and critical information infrastructure (CII), there is much concern pertaining to the extensive impact it may have on…
  • "Cybersecurity Experts Anticipate Growing Number of Attacks Against ERP Systems"
    A survey conducted by Crowd Research Partners with the help of ERPScan, reveals the lack of awareness and implementation of security measures within enterprises, though most cybersecurity professionals surveyed agree that the number of cyberattacks…
  • "Bolstering the security of inter-domain routing"
    The Border Gateway Protocol (BGP), which is the default routing protocol for directing traffic between organizations such as ISPs and Autonomous Systems, will be undergoing improvements to secure the inter-domain routing traffic exchange. The NIST is…
  • "App uses smartphone compass to prevent voice hacking"
    Voice-based smartphone apps can pose serious security threats to users via voice hacking. Attackers could use audio samples of users’ voices for impersonation to deceive people and digital security systems in order to retrieve sensitive information.…
  • "Cybercriminals Regularly Battle it Out on the Dark Web"
    A recent study conducted by researchers at Trend Micro reveals that cybercriminals within the Dark Web are not only attacking those outside of it, but also those who participate in it. This discovery was made when the security vendor constructed four…
  • "Cloak-and-Dagger Attack Creates Android Device Takeover Risk"
    Researchers at Georgia Tech have recently discovered a new attack by the name of “Cloak and Dagger”, which can allow cyberattackers to take full control over an Android device to perform further malicious activity. According to researchers, this attack…