Your one-stop web resource providing safety and security information to manufacturers

Research

IT Rate of Change ‘Accelerating’

Just about three quarters of technology decision-makers feel a successful cyberattack could cost them their job, a new report said. That was just one of the findings in AVANT’S State of Disruption study which examined four key components of enterprise …

Digital Doppelgangers can Copy ‘Digital Masks’

An e-shop trading over 60,000 stolen and legitimate digital identities, called Genesis, is making successful credit card fraud easier to conduct, researchers said. This marketplace as well as other malicious tools involve abusing the machine-learning b …

OT Attacks Continue, Firms Lack Visibility

A lack of visibility into the attack surface, inadequate security staffing and reliance on manual processes undermine operational technology (OT) sector organizations’ stated requirements to protect OT and IoT infrastructure from downtime, a new report …

Half of ICSes Attacked in ’18: Report

One of the arguments against a cybersecurity program is “we have never been attacked so why should we spend the money,” and while that may appear to be true, the truth is everyone is facing some kind of attack scenario. Take a look at a new report comi …

New Supply Chain Attack

There is a new advanced persistent threat (APT) campaign funneling through the supply chain that could be affecting over one million users, researchers said. Attackers behind Operation ShadowHammer targeted users of the ASUS Live Update Utility, by inj …

Firms Not Ready to Succeed in Cyber Defense

Cybersecurity functions outsourced to third parties.Source: Deloitte There are notable gaps in organizations’ abilities to meet cybersecurity demands for the future, a new report found. There is a difference between what organizations aspire to versus …

Mobile Malware Attacks Double

The number of attacks using malicious mobile software nearly doubled in just one year, with 116.5 million attacks observed in 2018, compared to 66.4 million in 2017, a new report said. However, despite more devices suffering from attacks, the number of …

Looking to Protect Info over Wireless Networks

Remi Chou, an assistant professor at Wichita State University, is hoping his research will improve the security of confidential information sent over wireless networks.Source: Wichita State University Research is now underway to ensure secure transfer …

Dwell Factor: Security Getting Better

It is easy to dwell on constant attacks big and small hitting manufacturers these days, but one positive coming out is companies are getting better at detecting breaches, where the global median dwell time for an attack was down to 78 days, researchers …

CISO’s Moving Forward, but More to Go

Respondents of different job titles reported on levels of collaboration between networking and security across the enterprise. Percent of respondents, N=3,248Source: Cisco 2019 CISO Benchmark Study Chief Information Security Officers (CISO) have moved …

Possible to Beat PDF Security

It is possible to bypass security in PDF viewers to change signed documents, researchers said. “We analyzed signature validation processing on PDF files,” , said Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, and Jorg …

Govt., Private Sector Need to Unite on Cyber: Report

Unless government and private sector decision makers begin developing cyber-enabled economic warfare (CEEW) -specific procedures and trust now, the United States will find itself flat-footed during a major cyber event. That’s the conclusion of a report …

Safety, Security, Privacy in Interconnected World

Ability to maintain a strong safety, cybersecurity, and privacy posture.Source: Ponemon Institute Convergence is essential or very important for companies and their ability to achieve a more mature security posture will increasingly depend on the conve …

DDoS Attacks, Fewer in Quantity, More Sophisticated

Distribution of DDoS attacks by day of the week, Q3 and Q4 2018.Source: Kaspersky Lab There has been a decline in the overall number of Distributed Denial of Service (DDoS) attacks from the previous year, but attackers are turning to longer, more sophi …

Russia, China can Disrupt Critical Infrastructure

China, Russia, Iran, and North Korea increasingly use cyber operations to threaten minds and machines to steal information, to influence citizens, or to disrupt critical infrastructure, a new report said. Threats to U.S. national security will expand a …

OT Risks Underestimated: Report

As hackers increasingly attack operational technologies (OT), companies are not aware of the threats cyberattacks pose to their OT assets, new research found. On top of that, end users’ security measures are usually not tailored to OT, according to the …

Workplace Fatalities Down in Past Year

There were fewer workplace fatalities in 2017 than the previous year, according to the Bureau of Labor Statistics’ National Census of Fatal Occupational Injuries (CFOI) in 2017 (CFOI) report released in December. While the number is not huge, the fatal …

Reality Skews Security Confidence: Report

In an environment where viewing the world with rose-colored glasses provides a false sense of security, a new survey found a large majority of users are confident in their security programs, but about half of them have suffered a breach and then anothe …

Manufacturing Leads in IoT Spending for 2019

It is easy to see why security expenditures will continue to grow because global spending in manufacturing automation for the Internet of Things (IoT) is poised to take off this year, researchers said in a new report. While IoT spending is forecast to …

Security Analytics Continuing to Grow

No one can deny the Internet of Things (IoT), the Industrial Internet of Things (IIoT) or just plain digitalization are continuing to grow throughout all industries. With that growth comes unprecedented productivity gains, but also potential cybersecur …

Pin It on Pinterest