Research

This is a archive for Research.

Olympic Attack Group Returns to Action

The attack group behind Olympic Destroyer, the cyberthreat that struck the opening of the Winter Olympic Games in Pyeongchang, South
Read More.

How to Create Safety Culture Participation

Increased worker participation in the development of safety protocols reduces injury rates and imparts five important steps on how to
Read More.

Employee Behavior and Security Effectiveness

One quarter of employees are creatures of habit and end up reusing the same password, a new survey found. On
Read More.

Attack going Ultrasonic

Hard disk drives (HDDs) can be interfered with through sound waves, but it is also possible to do harm through
Read More.

Authorization Framework for Connected Cars in Works

A connected car authorization framework is in development that can provide a conceptual overview of various access control decisions and
Read More.

Mobile App Fraud Transactions Skyrocket

Fraudulent transactions originating from a mobile app during the first quarter increased by 200 percent since 2015, a new report
Read More.

Virtual Machine Encryption Bypass

There is a new attack that can get around AMD’s Secure Encrypted Virtualization (SEV), researchers said. SEV is a hardware
Read More.

Breach Costs Continue to Rise: Report

The average cost of experiencing a data breach globally is on the rise, with breaches now amounting to $1.23 million
Read More.

Exploiting People: Phishing a Manufacturing Target

It is one thing for a bad guy to sit down for hours upon hours and days upon days to
Read More.

New DDoS Attack Leverages Old Issue

A new distributed denial of service (DDoS) attack takes advantage of an exploitable vulnerability in the Universal Plug and Play
Read More.

 
 
Archived Entries