Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersec... Read more
There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness. On April 29, someone hit his employer, IDT Corporation, with two cyberwea... Read more
A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from Ben-Gurion University of... Read more
TO A layman, the phrase “Internet of Things” (IoT) probably conjures up a half-fantastic future in which refrigerators monitor their own contents and send orders direct to the groc... Read more
Computer networks may never float like a butterfly, but Penn State information scientists suggest that creating nimble networks that can sense jabs from hackers could help deflect... Read more
Researchers develop a way to stop ransomware Ransomware – what hackers use to encrypt your computer files and demand money in exchange for freeing those contents – is a... Read more
‘Enhanced Attribution’ will anonymise threat data, reveal past and future crimes The US Military skunkworks Defense Advanced Research Projects Agency (DARPA) is hoping... Read more
A team of George Mason researchers proposes a “moving-target” defense against distributed denial-of-service attacks. The defense works by repeatedly shuffling client-to-server assi... Read more
The recent cyber attack on Ukraine’s power grid highlights a new challenge for the United States: not only protecting our electric system against such attacks but also ensuring tha... Read more
The Obama administration has warned the nation’s power companies, water suppliers and transportation networks that sophisticated cyberattack techniques used to bring down part of U... Read more
A power cut in western Ukraine last month was caused by a type of hacking known as “spear-phishing”, says the US Department of Homeland Security (DHS). The attack cause... Read more
When President Obama meets with other NATO leaders later this week, they are expected to ratify what seems, at first glance, a far-reaching change in the organization’s mission of... Read more
Mark 2013 down as the year that the global cyberweapons arms race started. Already, there have been five cyberattacks of unprecedented size and scope in just the first six months o... Read more