searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

BGU

Get our top stories in your inbox

Users can be manipulated to share private information online

January 5, 2021

Online users are more likely to reveal private information based on how website forms are structured to elicit data, Ben-Gurion University of the Negev (BGU) researchers have …

Malware may trick biologists into generating dangerous toxins in their labs

December 1, 2020

An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion …

Researchers open the door to new distribution methods for secret cryptographic keys

October 21, 2020

Researchers from the University of Ottawa, in collaboration with Ben-Gurion University of the Negev and Bar-Ilan University scientists, have been able to create optical framed …

Researchers develop AI technique to protect medical devices from anomalous instructions

August 27, 2020

Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …

New defense method enables telecoms, ISPs to protect consumer IoT devices

August 4, 2020

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National …

Researchers extract personal data from video conference screenshots

July 14, 2020

Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …

DDoS attacks could affect next generation 911 call systems

March 13, 2020

Despite a previous warning by Ben-Gurion University of the Negev (BGU) researchers, who exposed vulnerabilities in 911 systems due to DDoS attacks, the next generation of 911 …

Researchers trick autonomous car autopilot with phantom images

February 25, 2020

Researchers from Ben-Gurion University of the Negev’s (BGU) Cyber Security Research Center have found that they can trick the autopilot on an autonomous car to …

Researchers develop new optical stealth encryption technology

January 31, 2020

The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network …

New user keystroke impersonation attack uses AI to evade detection

June 10, 2019

A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …

A botnet of smart irrigation systems can deplete a city’s water supply

August 9, 2018

Ben-Gurion University of the Negev (BGU) cyber security researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation …

Exfiltrating private keys from air-gapped cold wallets

April 24, 2018

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security …

Posts navigation

1 2

Featured news

  • RansomHouse: Bug bounty hunters gone rogue?
  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
Easily migrate to the cloud with CIS Hardened Images

What's new

Vishing cases reach all time high

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

Account pre-hijacking attacks possible on many online services

Don't miss

Account pre-hijacking attacks possible on many online services

RansomHouse: Bug bounty hunters gone rogue?

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

How confident are CISOs about their security posture?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise