Reports

Reading the ENISA Threat Landscape Report 2018Reading the ENISA Threat Landscape Report 2018

Reading the ENISA Threat Landscape Report 2018

According to the ENISA Threat Landscape Report 2018, 2018 has brought significant changes in the techniques, tactics, and procedures associated…

6 years ago
Cranes, drills and other industrial machines exposed to hack by RF protocolsCranes, drills and other industrial machines exposed to hack by RF protocols

Cranes, drills and other industrial machines exposed to hack by RF protocols

Researchers from Trend Micro have analyzed the communication protocols used by cranes and other industrial machines and discovered several flaws.…

6 years ago
Too many issues in Pentagon networks expose it to cybersecurity risksToo many issues in Pentagon networks expose it to cybersecurity risks

Too many issues in Pentagon networks expose it to cybersecurity risks

A new security assessment conducted by the Defense Department Inspector General revealed that the Pentagon is still exposed to many cyber risks,…

6 years ago
Facebook tracks non-users via Android AppsFacebook tracks non-users via Android Apps

Facebook tracks non-users via Android Apps

New thunderclouds on Facebook, the social network giant is accused of tracking non-users via Android apps. According to a report presented…

6 years ago
US ballistic missile defense systems (BMDS) open to cyber attacksUS ballistic missile defense systems (BMDS) open to cyber attacks

US ballistic missile defense systems (BMDS) open to cyber attacks

U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit US DoD Inspector General's report revealed United States' ballistic missile defense systems…

6 years ago
M2M protocols can be abused to attack IoT and IIoT systemsM2M protocols can be abused to attack IoT and IIoT systems

M2M protocols can be abused to attack IoT and IIoT systems

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of…

7 years ago
Reading the Android Ecosystem Security Transparency ReportReading the Android Ecosystem Security Transparency Report

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in Lollipop to…

7 years ago
USB drives are primary vector for destructive threats to industrial facilitiesUSB drives are primary vector for destructive threats to industrial facilities

USB drives are primary vector for destructive threats to industrial facilities

USB removable storage devices are the main vector for malware attacks against industrial facilities, states Honeywell report. According to a report published…

7 years ago
NHS is still assessing the cost of WannaCry one year laterNHS is still assessing the cost of WannaCry one year later

NHS is still assessing the cost of WannaCry one year later

The UK's Department of Health and Social Care provided an update on the efforts to secure the NHS IT infrastructure,…

7 years ago
GAO report reveals new Pentagon weapon systems vulnerable to hackGAO report reveals new Pentagon weapon systems vulnerable to hack

GAO report reveals new Pentagon weapon systems vulnerable to hack

According to a new report published by the Government Accountability Office (GAO) almost any new weapon systems in the arsenal…

7 years ago