News
  • "Printer-spoofing Campaign Installs Espionage-Bent Backdoors Inside the Enterprise"
    A small spike in attacks through the use of Canon, HP, and Epson printer and scanner email attachments has been highlighted by Barracuda Networks. Many attempts have been made by cybercriminals to launch malware attacks through spoofed emails that appear…
  • "Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet"
    Some models of Sonos and Bose speakers were discovered by researchers at Trend Micro to be vulnerable to attacks in which hackers could take control and play audio files. Poorly configured network settings allow these internet-connected speakers to be…
  • Pub Crawl #12
     
  • "Gaps in Software Slowing down Security Professionals"
    Widmeyer conducted a study in which 751 IT decision-makers, the participants of which included Asia-Pacific, UK, and the US. The results of this study brings attention to the impact that insufficient software system functions have on the productivity of…
  • "Fileless Malware Attacks Hit Milestone in 2017"
    According to Carbon Black’s 2017 Threat Report, there has been a significant increase in fileless malware attacks as they account for the majority of cyberattacks in 2017. Fileless malware attacks require less steps to be deployed and use native…
  • "NTU Study Says Hackers Can Use Sensors in Your Smartphone to Crack Pin"
    A study conducted by researchers at Nanyang Technological University, Singapore reveals that sensors within smartphones could be used by hackers to crack user PIN codes. Researchers were able to crack PIN codes on some Android smartphones through the use…
  • "Massive Leak Exposes Data on 123 Million US Households"
    Security researchers at UpGuard revealed that information on 123 million American households was leaked as a result of an unsecured cloud-based data repository from marketing analytics company Alteryx. The Alteryx database exposed a variety of different…
  • "Proof of Randomness Builds Future of Digital Security"
    A method has been developed by researchers at Princeton University to validate the strength of random number generators that are relied upon by most encryption systems in order to generate cryptographic keys. Vulnerabilities within random number…
  • “Why Defense in Depth Must Include Secure Messaging”
    Federal, state, and local government agencies continue to experience cyber incidents at a significantly higher rate than industries within the private sector as a result of slow digital transformation. Email phishing is still the most used threat vector…
  • “AI Should Not Replace Tried-and-True Security Practices”
    Federal government agencies are making use of artificial intelligence (AI) and machine learning to strengthen the U.S.’s cybersecurity. AI lessens many of the challenges faced by agencies in managing massive amounts of data and network traffic by…
  • "New AI Method Keeps Data Private"
    Researchers at the University of Helsinki, Aalto University, and Waseda University of Tokyo have developed a new privacy-aware machine learning method. According to researchers, this method ensures that information on each data subject of a machine…
  • "Electromagnetic Emissions From Smartphones Analyzed for Security Vulnerability"
    A new tool is being developed by researchers at UC3M and the CSIC (Spanish National Research Council) to determine whether the electromagnetic emissions from smartphones poses a risk to the security and privacy of users. The electromagnetic…