Cybersecurity & IT
Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks.
Research and observations indicate that the Communist Party of China (CPC) is tasking the Chinese People’s Liberation Army (PLA) to commit systematic cyber espionage and data theft against organizations around the world.
Stuxnet: The World’s First Digital Weapon. A unprecedented cyber weapon that ravaged Iran’s nuclear program by attacking their industrial programmable logic controllers (PLCs) at the Natanz nuclear facilities.
The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots and copycats.
A new variant of this trojan, dubbed KINS 2.0 aka ZeusVM, is using images as a decoy to retrieve its configuration file, a vital piece for its proper operation.
Browse the Research Papers library to find research papers and other publications related to Information Technology, Cybersecurity, Industrial Infrastructure Security, National Security, and more.
HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data