News

Numerous studies focus on aspects of cybercrime aftermath, such as a company’s lost reputation or its struggles to obtain future clients after incidents. However, Malwarebytes commissioned Osterman Research to determine the direct costs of cybercrime associated with three areas: the costs of major event remediation, expenses for security budgets and cybercrime caused by so-called “gray hats.” The rest of this piece not only reveals the growing prominence of gray hats but, primarily, how common it...

Read more

The University has been named as an Academic Centre of Excellence in Cyber Security Research by the UK’s National Cyber Security Centre (NCSC), becoming the first institution in Wales to be given this status. The award is in recognition of the internationally excellent research developed at the University over a number of years, and will allow academics to feed directly into the UK Government’s strategy of making the country more resilient to cyber-attacks. Furthermore, as...

Read more

Today McAfee, the device-to-cloud cybersecurity company, announces findings from its new study, The Age of Consent. The study discovered that 20% of UK parents share at least one video or photo of their children on social media a day, resulting in approximately 1.3 billion images of children under the age of 16 floating around on social media a year – showing the extent of child exposure on the web. Most parents recognise the concerns associated...

Read more

The modernization of utility infrastructures is enabling increased efficiencies and reliability through digitization, connectivity, and IT-based approaches. Smart cyber assets are transforming both power and water grids, allowing operators to deploy and leverage a new generation of functionality and customer services. However, smart utilities are also highly vulnerable to cyberthreats, and security is, therefore, a primary concern, stated ABI Research. View Full Story ORIGINAL SOURCE: Help Net Security

Read more

Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks. A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks. View Full Story ORIGINAL SOURCE: Dark Reading

Read more

Tavis Ormandy, a Google Project Zero security researcher, has revealed details about a new major vulnerability discovered in Ghostscript, an interpreter for Adobe's PostScript and PDF page description languages. Ghostscript is by far the most widely used solution of its kind. The Ghostscript interpreter is embedded in hundreds of software suites and coding libraries that allow desktop software and web servers to handle PostScript and PDF-based documents. View Full Story ORIGINAL SOURCE: Bleeping Computer

Read more

Academic Centres of Excellence in Cyber Security Research recognised by the National Cyber Security Centre & Engineering and Physical Sciences Research Council. Three UK universities have been recognised as Academic Centres of Excellence in Cyber Security Research (ACE-CSR), highlighting the country is leading the way in cyber security skills. View Full Story ORIGINAL SOURCE: Gov.co.uk

Read more

Attackers can abuse URL requests processed by an email program for Mac to steal files from the victim — sometimes without user interaction. Severe vulnerabilities in the Airmail 3 software – an alternative to Apple Mail for MacOS – would allow a remote attacker to steal a user’s past emails and file attachments, in many cases without requiring user interaction beyond simply opening a weaponized message. View Full Story  ORIGINAL SOURCE: Theatpost

Read more

JavaScript web apps and web servers are susceptible to a specific type of vulnerabilities/attacks known as regular expression (regex) denial of service (ReDoS). These vulnerabilities take place when an attacker sends large and complex pieces of text to the open input of a JavaScript-based web server or app. View Full Story ORIGINAL SOURCE: Bleeping Computer

Read more
Page 30 of 1031 1 29 30 31 1,031