How Smart Cities Can Minimize the Threat of Cyber Attacks

As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities. In the not-so-distant future, smart cities will weave the Internet of Things (IoT) and interconnected devices into existing technology infrastructure to bring entire communities online. Singapore, for example, recently launched its Smart Nation program, deploying citywide…

Week in review: PowerPoint malware delivery, dark web fraud guides, security through APIs

Here’s an overview of some of last week’s most interesting news and articles: UK ICO offers grants for practical privacy research The programme is open to academic institutions, civil society groups, trade and industry associations and organisations with a genuine commitment to public benefit outcomes. Proposals do not need to be technology based but must…

How vulnerability research benefits both vendors and customers

Zero-day vulnerabilities – newly discovered exploits that haven’t been previously identified – are now emerging more often. Worse still is the fact that these dangerous flaws sometimes aren’t pinpointed until hackers have already exploited them. According to a prediction from Cybersecurity Ventures founder and Editor-in-Chief Steven Morgan, the frequency of zero-day exploits – which were a…

After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

Here’s a security scenario that’s all too common: A company suffers from a cyberattack, then responds to it promptly and alerts its customers, warning them to change their passwords. But the company remains vulnerable through the very means it uses to alert those customers: Email. In fact, attackers can exploit that vulnerability using email that…

APT3 hackers linked to Chinese intelligence

The APT3 hacker group, which has been attacking government and defense industry targets since 2010, has been linked to the Chinese Ministry of State Security, according to a report by Recorded Future. Other attackers have been linked to the Chinese military, but this is the first time a group has been connected to Chinese intelligence,…

Week in review: WannaCry decryptor available, stealing Windows credentials using Google Chrome

Here’s an overview of some of last week’s most interesting news and articles: DocuSign breached, stolen info used for targeted phishing campaign Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically targeting registered DocuSign users. There’s now a WannaCry decryptor tool…