Author Description

Gary M

Author Posts

Android Alert: HiddenMiner Android Cryptocurrency miner can brick your device

Researchers at Trend Micro recently discovered a new strain of Android miner dubbed ANDROIDOS HIDDENMINER that can…

We’re Releasing The Global Threat Intelligence Vendor Landscape at RSA Conference 2018

Cyber Defense Magazine will be releasing our first Quarterly Vendor Landscape report at the RSA Conference 2018. …

Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?

There’re no big surprises in the recent Technical Alert issued by the Department of Homeland Security (DHS)…

Introduction to Machine Learning (ML) for Cybersecurity

Time to a breach.  Time to detect.  Time to react.  What’s your exposure time?  Gary Miliefsky, the…

Cyber Secure IP Video Solution: Credentialed High Assurance Video Encryption (CHAVE®)

End-to-End Video Data Encryption for High Assurance Security Video Applications Mission critical and critical infrastructure environments must…

Facebook Privacy Failures and Opportunities

Facebook faces tremendous business risks from the upcoming EU’s GDPR privacy rules set to take effect in…

Department of Energy Cyber Defense Competition April 6-7, 2018

The U.S. Department of Energy (DOE) is hosting its third annual Cyber Defense Competition, April 6-7, 2018,…

Malicious Apps in Global App Stores Decrease 37 Percent, Feral Apps Lose Ground to Third-Party Stores, RiskIQ’s Q4 Mobile Threat Landscape Report Finds

Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in…

A.I. IoT Robot Critical Vulnerability Discovered, Proof of Concept Exploit

Some people are very afraid of an artificially intelligent future where vicious robots become attack dogs and…

MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakers

MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University, led by the…

Show Buttons
Hide Buttons