Cybersecurity Center Article Archive

The Cybersecurity Center at Purdue Global has compiled a list of cyber defense articles. Read on to learn more about current trends and challenges in the cybersecurity industry.

Will Robots Be Allowed to Kill?

September 23, 2019

As humans create autonomous robots for military and defense use, discussion turns to whether they should be allowed to kill. A particular concern is whether robot intelligence can safely tell friend from foe, particularly in regard to not targeting civilians.

Security Awareness Training: Why You Need a Corporate Acceptable Use Policy

September 20, 2019

A corporate acceptable use policy dictates which devices can or cannot access the company’s network. Having one can protect your data against malware attacks from innocuous-seeming sources.

Attackers Use Single Sign-On in Phishing Pages Used to Steal Credentials

September 20, 2019

Fake Single-Sign On (SSO) sites, which duplicate popular sign-in pages, have become a new tool for hackers to harvest passwords. Because SSO uses one set of credentials to log into multiple applications, it enables hackers to easily access a variety of accounts.

IoT Devices Send User Data to Third-Parties Including Netflix, Microsoft, and Google

September 20, 2019

A recent study found that a majority of Internet of Things (IoT) devices expose data to third parties such as Netflix, Spotify, and Google. This data includes location data and IP addresses that can be exposed by online eavesdroppers.

Human Participation Lies Behind 99% of Cyber Attacks

September 17, 2019

An investigation shows that an overwhelming majority of cyber-crime relies on the targeted victim to open a file or click on a link. Phishing attacks remain a cornerstone of hacking because they are effective and growing even more sophisticated.

Security Awareness Training: What Does a Phishing Email Look Like?

September 6, 2019

Cybersecurity awareness training doesn’t just mean good password practices. In addition to defending against phishing attacks, we must also learn how to resist social engineering.

Cybersecurity Training and Jobs

September 6, 2019

Cybersecurity professionals are in high demand to fight data breaches and ransomware attacks, and information technology knowledge and a knack for problem solving can be your key to joining this in-demand field.

Treat Cybersecurity for What It Is—Part of Business, Not IT

September 5, 2019

Information security is becoming more recognized as a matter of business, not just IT, though new challenges arise as not all companies give it the same priority.

Gamification Can Transform Company Cybersecurity Culture

September 2, 2019

Gamifying your company’s cybersecurity practices can apply your employees’ desire for learning and recognition toward more actively protecting their data, as well as increasing IT’s awareness of weaknesses and training needs.

Twitter CEO’s Account Hacked in SIM-Swapping Scheme

September 2, 2019

Twitter CEO Jack Dorsey’s account was recently hacked through SIM-swapping, which impersonated his credentials and subverted two-factor identification.

Data Breaches Expected to Cost $5 Trillion by 2024

August 29, 2019

A recently published report says that by 2024, the annual cost of worldwide data breaches will exceed $5 trillion, reflecting higher fines for data breaches and greater damages for increasingly internet-reliant companies.

Defense Takeaways From Three Adversary Playbooks

August 28, 2019

In addition to keeping out hackers, cybersecurity can increasingly involve preventing bad actors from achieving their goals. Hacking groups can execute a variety of functions with phishing attacks creating problems from inside the system.

Emerging Technology Adoption Is Here: Are You Ready for It?

August 27, 2019

As new technologies create new business possibilities, more companies are working to integrate them into their operations. The keys are finding the right system for the right solution, figuring out how to correctly integrate it, and ascertaining the return on investment.

Home Working Can Often Be a Security Threat

August 20, 2019

Most small business owners allow their employees to work remotely, but a survey shows that one-fifth of owners have not offered cybersecurity training. This can create an enormous security risk as employees log in to unsecured public networks.

The Global Cyber Skills and Training Shortage

August 19, 2019

As cybercrime ramps up, more than 50% of businesses have reported a shortage of necessary cyber-skills, and the next decade is expected to see a shortage of workers with necessary cybersecurity skills.

Cybersecurity Firm Imperva Discloses Breach

August 19, 2019

In August 2019, internet firewall service company Imperva alerted its customers to a data breach that had exposed some of its customers’ email addresses, API keys, passwords, and SSI certificates.

How Government Entities Can Combat Cyber Threats

August 6, 2019

Since 2018, there have been 99 government and military data breaches in the U.S. alone. These breaches can shut down city services, online payment processing, and more. How should government agencies defend themselves from cyberattacks and ransomware?

Cybersecurity Leaders Face Challenges With Cyber Transformation

August 6, 2019

Deloitte’s The Future of Cyber 2019 report found that cybersecurity teams are faced with finite budgets and resources, hindering their ability to provide the necessary level of cyber security measures and management to protect an organization’s infrastructure.

End-User Training: Passwords Are a Pain—But They Are Critical to IT Security

August 5, 2019

Password protection is an absolutely necessary security component for everyone—even reticent executives. Everybody needs to use strong passwords so that all employees are creating minimal risk.

Organizations at Risk for Data Breaches: System Vulnerabilities Increase by 92 Percent

August 1, 2019

According to the State of The Crowdsourced Security in 2019 study, a 92% increase in total vulnerabilities was reported over the prior year. The average payout per vulnerability increased by 83%, with payouts for critical vulnerabilities increasing 27% over the previous year.

Why Cybersecurity Is a Great Field for Women

July 1, 2019

In addition to technical skills, soft skills such as adaptability, analytical thinking, attention to detail, and more are critical to stopping hackers and securing networks—and many of those are skills that women can bring to the table.

This Malware Created by a 14-Yr-Old Is Bricking Thousands Of Devices

June 26, 2019

Silex, a malware developed by a 14-year-old known as Light Leafon, is poised to brick thousands of IoT devices. Silex was inspired by the infamous BrickerBot malware, which bricked millions of IoT devices in 2017.

Cyber Criminals Have Created an Invisible Internet

June 25, 2019

Research suggests that online criminals are creating an invisible internet by turning to gated forums and encrypted apps to conduct cyber-crime deals on the dark net.

DDoS Attacks Up by 84% in Q1

June 20, 2019

According to Kaspersky Lab, DDoS attacks are on the rise after falling throughout 2018, suggesting that cyber-criminals are shifting attack methods after a prolonged period of focusing on other sources of income, such as cryptomining.

How Companies Are Tackling a Lack of Cybersecurity Experts

June 14, 2019

As cybercrime grows more sophisticated, organized, and effective, many experts believe it could trigger significant losses in the very near future. Some organizations are proactively working to raise awareness and provide specialized training to attract people to the profession.

Computers and Video Surveillance

June 14, 2019

Unlike the days when video storage was expensive and video feeds difficult to monitor, today’s video surveillance is more affordable and enhanced with features such as AI, analytics, and face recognition.

Five Reasons to Learn Cyber Security

June 13, 2019

From influencing major elections to attacking business of all sizes—including Adobe, Sony, and Facebook—the steadily increasing threat of cyber-attacks should not be underestimated.

Career Opportunities in Cybersecurity

June 10, 2019

The fast development of the Internet of Things (IoT) and smart devices throughout homes have made cybersecurity a household term, and governments are starting to create robust cybersecurity strategies to combat threats.

12 Million Quest Diagnostic Patients Exposed in Third Party Breach

June 7, 2019

American Medical Collection Agency (AMCA), a third-party vendor for Quest Diagnostics, reported that unauthorized users breached its internal systems, potentially affecting around 11.9 million Quest patients.

Why Should I Get a Cybersecurity Certification?

May 28, 2019

As an IT professional, cybersecurity is always part of the job, influencing how IT implements and maintains applications and systems to make everything more secure. Certifications can also help IT experts grow professionally and reach their career goals.

How to Spot a Scam: 14 Red Flags to Watch for

May 23, 2019

Many scammers use an emotional pull, or stressor event, to convince victims to deposit phony checks whose funds are ultimately reclaimed by the bank. To help employees identify and avoid these scams, companies should implement security awareness training.

Key Takeaways From the 2019 Verizon DBIR

May 22, 2019

The annual Verizon Data Breach Investigations Report is an extensive research report built from the analysis of 41,686 security incidents and 2,013 confirmed data breaches. The events are drawn from 73 public and private entity data sources spanning 86 countries worldwide.

Ransomware Cyberattacks Knock Baltimore's City Services Offline

May 21, 2019

After anonymous hackers breached the city of Baltimore's servers, the city’s digital resources were locked away, including access to government email, payments to city departments, and the ability to process real estate transactions.

IoT Connected Devices Need Better Cybersecurity

May 20, 2019

A compression technique known as quantization is making deep learning models smaller, reducing computation and energy costs, and smoothing the way for internet-connected devices to run more AI software to speed up image- and speech-processing tasks. But compressed AI models are vulnerable to attack; a new study may offer a solution.

The Role of Governments in Ensuring Global Security in the Cyber Age: Cyber-crimes, Cyberterrorism and Cryptocurrencies

May 19, 2019

While The Cyber Age has led to numerous advantages including increased access to information and instant communication, these benefits are heavily offset by the growth of the criminal and terrorist organizations that took full advantage of it.

Cybersecurity and IoT Suffering From the Skills Shortage

May 17, 2019

According to new research from Experis, the cybersecurity skills shortage is affecting Internet of Things (IoT) development. As IoT emerges as an asset that needs to secured, employers are thinking differently about their business and workforce strategies.

300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2019 EDITION]

May 13, 2019

This article contains the latest cybersecurity stats from trusted sources, highlighting the extent and implications of online criminal activity.

AI and the Future of Warfare

May 8, 2019

The U.S. War College recently discussed how artificial intelligence (AI) could change military command structures and what happens if AI creates a war strategy that’s beyond the human mind’s comprehension.

The Insane Demand for Cybersecurity Workers

April 30, 2019

Demand for qualified cybersecurity workers is high. In fact, there will be approximately 3.5 million unfilled cybersecurity jobs across the globe by 2021.

Best IT Certifications for 2019

April 29, 2019

Whether you work for a large corporation, a small business, the government, or a health care organization, validating your skills and knowledge through IT certifications is the best way to advance your IT career.

The Spycraft Revolution: Espionage Technology

April 27, 2019

As espionage faces technological, political, legal, and social change, those who break the old rules and create new ones will come out on top. Paradoxically, the trade will also need to shed much of the secrecy that has cloaked espionage since its inception.

The Admissibility of Blockchain as Digital Evidence

April 23, 2019

Organizations are using blockchain technology to create a diverse range of applications, including secure decentralized databases for digital transactions, supply chain management, cybersecurity, and more. Given the emerging uses of blockchain technology, how it is treated in litigation and other business disputes is increasing in importance.

Ethical Hacker Guilty of Malware Attacks

April 23, 2019

Cybersecurity researcher Marcus Hutchins was instrumental in stopping ransomware from encrypting the databases of government agencies and networks in over 150 countries. But while still a minor, Hutchins developed and distributed malware that played a role in attacks on U.S. banking systems.

America Remains Vulnerable to Cyber Attack

April 16, 2019

To protect U.S. critical infrastructure, former CIA director Leon Panetta and former Republican Senator James Talent recommend separating business IT systems from systems that control infrastructure and allowing private-sector or academic cybersecurity experts to work for federal agencies.

Deep Learning & Cybersecurity

April 25, 2019

As current network security measures fail to keep up with new cybersecurity threats, IT is turning to deep learning and other types of artificial intelligence (AI). As dep learning becomes more accessible to organizations, it supports innovation and the execution of complex business processes.

Newly Discovered RobinHood Ransomware Variant Drops Four Ransom Notes at Once After Encryption

April 15, 2019

The RobinHood ransomware targets computers within an entire network, encrypting files until the victim pays the ransom amount. Once the ransom is paid, the attackers delete the encryption keys and IP addresses to protect the victim’s privacy.

New Phishing Scam “The Nasty List” Targets Instagram Users’ Login Credentials

April 15, 2019

A phishing scam called “The Nasty List” targets Instagram users to gain access to their accounts. Once accounts are compromised, the scammers will send messages to followers of the hacked accounts to further promote the scam.

Big Companies Thought Insurance Covered a Cyberattack. They May Be Wrong.

April 15, 2019

Companies can face hundreds of millions of dollars in damages from a cyberattack blamed on a foreign government, but a common clause in insurance contracts, the “war exclusion,” protects insurers from having to reimburse costs related to damage from cyber war.

National Teams Engage in NATO’s Annual Cyber Challenge

April 15, 2019

NATO’s annual cyber challenge Locked Shields enables participants to enhance their skills and train as national cyber rapid reaction teams in a realistic large-scale cyber incident. More than 1,200 international cyber security experts took part in the 2019 challenge.

Your Next Move: Data Scientist

April 15, 2019

Part of an IT Career News series called Your Next Move, this article outlines the role of the data scientist, the steps to become one, and the career outlook for the profession.

What’s the State of Blockchain in Cyber Security? 7 Experts Share Their Insights.

April 12, 2019

While blockchain-powered anti-virus software doesn’t exist yet, commercially viable blockchain systems are in development. However, blockchain adoption in cybersecurity isn’t happening quickly due to scalability, energy consumption, and investment in existing systems.

IoT, GDPR and More Cybersecurity Trends in 2019

April 12, 2019

TÜV Rheinland released its Cybersecurity Trends 2019, a report that contains eight important developments in cybersecurity. 

Is Assange’s Arrest a Threat to the Free Press?

April 11, 2019

Many people, including those who did not support Julian Assange’s actions, were alarmed by the idea that Assange could be punished for his role in exposing American government secrets. Those concerned with civil liberties believe elements of his indictment could set a dangerous precedent.

Critical Infrastructure Is Under Worldwide Attack

April 10, 2019

Cyberattacks on critical infrastructure have increased significantly recently, and these attacks negatively impact crucial networks around the globe. Learn about seven key findings and recommendations for improving network security.

Linux and Cybersecurity: Your Linux Skills Can Help Protect the World’s Data

April 10, 2019

Learn about some of the new and emerging groundbreaking opportunities for using Linux in IT and cybersecurity.

How Cybersecurity Analysts Can Stand Out to Potential Employers

April 8, 2019

Despite the demand for qualified cybersecurity applicants, it’s difficult for hiring managers to fill cybersecurity analyst roles. IT professionals need to know what hiring managers look for in security analysts and how best to highlight their skills when searching for cybersecurity positions.

Cyber Security Pros Are Feeling the Pressure

March 6, 2019

A survey shows the impact that stress has on cybersecurity personnel, with many saying they work more than 40 hours a week or feel unable to disconnect from their work.

Four Ways That Fake-News Sites Trick People

March 5, 2019

Fake-news websites have been appearing with increasing frequency and produce a constant stream of falsehoods that quickly spread across social media. They use several methods to trick readers into believing and spreading stories that can seem real.

AI Driven Cybersecurity Gives Companies a Fighting-Chance

February 28, 2019

Artificial intelligence has the potential to become a strong line of defense against cyber threats, provided it has been constructed with sharp risk assessment and incident response in mind.

Personal Cyber Insurance Market Could Be Worth $3B by 2025

February 26, 2019

The global market for personal cyber insurance is expected to grow rapidly over the next several years. These policies are specifically designed to cover any loss or liability in the event of a cyber attack.

Lack Of Tech Expertise at Board Level Puts Strategy at Risk

February 25, 2019

A recent poll suggests that boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organizations. Technology is now emerging more quickly than ever, and governance professionals can find themselves quickly falling behind.

The US Pentagon Is Speeding-Up Its Cloud Strategy

February 22, 2019

The Defense Department has released its military cloud strategy, which plans to emphasize defense against cyber attacks and the safety of its soldiers.

Will Blockchain Change the World?

February 22, 2019

Blockchain, an electronic distributed database of recorded transactions, has enormous potential in a variety of industries and has attracted a lot of positive attention, though any revolution is still in its infancy.

Meeting the Cyber Talent Challenge Head-On

February 14, 2019

As data breaches and cyber criminal threats become more common, human resources professionals must help organizations acquire the best talent by identifying the right roles and demonstrating corporate dedication to cybersecurity.

White Hat Female Hacker Lead the Way

February 13, 2019

Sherri Davidoff, CEO of LMG Security, leads an all-female management team of “white hat” hackers who use hacking to test companies for cybersecurity flaws.

The Top 5 Malware Attack Types

February 12, 2019

Malware can infect a computer system in a variety of ways, and as the number of cyber attacks increases, so also does the number of different malware types of which to beware.

Is Cybersecurity More Important Than Cost, Schedule or Performance?

February 1, 2019

As government defense systems face an increased need for cybersecurity, acquisition policy also has room to improve. While price, schedule, and performance are normally the “three pillars of acquisition,” security incidents can necessitate prioritizing the best solutions.

The State of the SOC: the Digital Divide

January 30, 2019

Global security operations center professionals are part of the first line of defense against cyber threats but can be estranged from chief information security officers by stress and business needs. Bridging the gap between security and IT operations is critical to protect against cyber threats.

CompTIA Advanced Security Practitioner (CASP+): Validating Cybersecurity Skills for Government and Corporate Teams

January 28, 2019

The CompTIA Advanced Security Practitioner (CASP+) certification used by cybersecurity personnel for the U.S. Navy can also provide advanced utility in the corporate sector. CASP+ can benefit both job seekers looking to demonstrate their cybersecurity skills and corporations searching for the right hire.

Nations Will Spar Over AI

January 25, 2018

Artificial Intelligence (AI) is growing and expected to reach $15.7 trillion by 2030, and its fast growth means not only individual companies, but also countries, are working on strategies to claim the biggest possible piece.

The US Pentagon Has Numerous Security Gaps

January 23, 2019

A recent U.S. Defense Department report indicates that the Pentagon must address a large number of cybersecurity vulnerabilities, many of them related to proper governance.