News
  • "Georgia Just Passed a Broad Cybercrime Bill That Has Researchers Worried"
    SB 315 is a cybercrime bill that has been passed by the Georgia legislature. This bill is raising serious concerns among security researchers within the state of Georgia. It poses a threat to academic and independent security researchers as it aims to…
  • "Cyberattack Targets Energy Industry Pipeline Data"
    Energy Transfer Partners, a Dallas-based pipeline company, was recently hit by a cyberattack. Cybercriminals hacked the pipeline network’s electronic data interchange system, which is used to facilitate oil and gas transactions. This article continues to…
  • "Hacking Your Brain(Scan): Security Bugs in EEG Software Open Hospitals to Attack"
    Researchers at Cisco’s Talos Intelligence Group have uncovered vulnerabilities contained by Natus NeuroWorks software, which is used in several electroencephalogram (EEG) devices.  The exploitation of these vulnerabilities could allow attackers to…
  • "A New Mirai-Style Botnet Is Targeting the Financial Sector"
    A new Mirai-like botnet composed of compromised internet-connected televisions and webcams has been found to be targeting the financial sector. DDoS attacks that have been recently faced by three institutions within the financial sector are believed to…
  • "True Random Entropy Is an IoT Necessity"
    True entropy randomness is the key to improving the security of IoT devices. Entropy as a Service (EaaS) has been proposed by NIST to deliver quantum entropy sources to IoT devices. This article continues to discuss IoT security challenges, the…
  • "The Pentagon's Latest Bug Bounty Target Is Its Travel Booking System"
    The Department of Defense (DoD) has launched another bug bounty program, which focuses on finding security flaws contained by the Defense Travel System (DTS). DTS is a travel management system used by DoD personnel to book flights, hotels, and more. The…
  • "How to Close the Security Update Gap"
    ACROS Security conducted a survey to which 340 professionals responsible for security patching responded. The survey asked questions regarding the ways in which the process of security patching could be improved. Respondents showed great interest in…
  • "Automation and Gamification Key to Cyber Security"
    A survey conducted by McAfee indicates that the use of automation and gamification are essential to cybersecurity. As IT security teams continue to face challenges in relation to the growing cyberthreat landscape, cybersecurity talent gap, and retention…
  • "Baltimore's 911 Dispatch Hacked, CAD System down for 17 Hours"
    Baltimore's 911 system recently faced an attack, which took down its computer-aided dispatch (CAD) system for 17 hours. The attack significantly impacted efficiency as details pertaining to incoming callers had to be relayed to dispatchers manually…
  • "Fileless Crypto-Mining Malware Discovered"
    Security researchers from Minerva Lab discovered malware called GhostMiner that performs illicit cryptomining of Monero. The malware applies a fileless infection method to hide its code in order to circumvent detection by security tools. This article…
  • "Improve Your Information Security by Giving Employees More Options"
    According to a recent study, employees are more likely to improve upon their security behavior when provided with engaging security messages that allow them to choose how they can enhance the security of information and respond to threats in the…
  • "Outdated Cyber Defence Puts Organisations At Risk, Says Webroot"
    Webroot’s 2018 Annual Threat Report emphasizes the need for organizations to update their cyber defenses as the cyber threat landscape continues to expand and grow in complexity. Organizations are encouraged to implement multi-layered security, make use…