Hacking 3D manufacturing systems demonstrated by researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a cyber attack and malicious manipulation of blueprints can fatally damage production of a device or machine. In their paper titled “Dr0wned,” researchers from Ben-Gurion University of the Negev (BGU), the University…

Mainframe Security: An Easy and Intuitive Access Security Model

Mainframe security is simple to understand and extremely intuitive to apply. Some might find it hard to believe that the mainframe security model can be easily integrated with other platforms and applications. As everyone in the IT industry knows, a system’s security level depends strictly on the possibility of attacks from unknown and unplanned access….

Cybersecurity Industry Outlook: 2017 to 2021

In 2004, the global cybersecurity market was worth $3.5 billion — and by 2017 it will be worth at least 35X that amount, according to numerous estimates from market researchers and analysts. Cybersecurity is one of the fastest growing and largest technology sectors. Four predictions from Cybersecurity Ventures frame the cybersecurity economy over the next…

Why you need to develop an immersive security strategy

Security solutions today are inadequate in part because they do not provide a truly effective experience for consuming security data and analyzing and responding to threats. In this evolving threat landscape, businesses will need to utilize intuitiveness and situational awareness to enable security professionals to really “experience” the data and become more efficient and strategic….

Malware and spam groups exploit US election fever

Over the past month, Symantec has blocked almost 8 million spam emails relating to the US presidential election. The volume of spam has increased steadily during that period, reflecting rising interest in the election as the November 8 polling day draws near. The trend reflects one of the tactics most commonly used by spam groups….

Backdoor Uploaded to WordPress Sites via eCommerce Plugin Zero-Day

A zero-day vulnerability in an ecommerce plugin for WordPress has been exploited by cybercriminals to upload backdoors to affected websites, researchers warned. The ideal scenario for profit-driven hackers is to find and exploit security holes in plugins installed on hundreds of thousands or millions of websites. However, targeting a large number of less popular applications…

Millennials A Growing Target Of IT Support Scams

New Microsoft-NCSA study finds that two out of three customers have been exposed to tech support scams in the last 12 months. More millennials are falling victim to tech support scams, surpassing senior citizens as the group most frequently tricked by fraudsters. This finding comes from a new study released by Microsoft and the National…

How To Become A Cybersecurity Entrepreneur In A Crowded Market

If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions. Declines in venture funding often paralyze the technology community. Talk of bubbles, dying unicorns, and austerity can surge for weeks following a negative report. In response, many entrepreneurs hit pause on their dreams, believing they should…

Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the United States. ISACA recommends that cyber security be a significant component of the next president’s 100-day agenda, especially given its overlap with geopolitical and economic issues. Bolstering the…