Tag "Software Security"

Back to homepage

Using security cameras and infrared light to extract data from air-gapped networks

 Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light capabilities of (indoor and outdoor)

Identity Theft

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don’t need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.”We see it every day,” says


Top Tech Vendors Targeted by CCleaner Malware

A cyber-attack revealed this week which spread via popular performance optimization tool CCleaner was designed to target several major technology firms, it has emerged.Updates from both Cisco Talos and Avast


aIR-Jumper – A malware exfiltrates data via security cameras and infrared

Researchers at the Ben-Gurion University developed a PoC malware dubbed aIR-Jumper that uses security cameras with Infrared capabilities to exfiltrate data.The team of researchers at the Ben-Gurion University of the


Maintaining Windows 10 security tops list of enterprise challenges

Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over half of respondents to an Adaptiva

Software Security

Artificial Intelligence Can Drive Ransomware Attacks – Information Security Buzz

Artificial intelligence has become a highly competitive industry that is expanding rapidly thanks to the investments made by the high-tech corporations and state governments worldwide. The prospects of using the


Why 2017’s Phishing Attacks Teach Us All to Beware – Infosecurity Magazine

At the end of 2016, we claimed it was the year that phishing went mainstream. Yet the first half of 2017 has seen the main ‘stream’ turned into a torrent.In


The three least effective enterprise security measures

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will always be exploitable.Understandably,


Google Chrome most resilient against attacks, researchers find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks.“Modern web browsers such as Chrome or Edge improved security in


Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach.The study found that strong