![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
Users can be manipulated to share private information online
Online users are more likely to reveal private information based on how website forms are structured to elicit data, Ben-Gurion University of the Negev (BGU) researchers have …
![DNA](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103421/dna-400x200.jpg)
Malware may trick biologists into generating dangerous toxins in their labs
An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093204/connection1-400x200.jpg)
Researchers open the door to new distribution methods for secret cryptographic keys
Researchers from the University of Ottawa, in collaboration with Ben-Gurion University of the Negev and Bar-Ilan University scientists, have been able to create optical framed …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
Researchers develop AI technique to protect medical devices from anomalous instructions
Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
New defense method enables telecoms, ISPs to protect consumer IoT devices
Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National …
![BGU Zoom research](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13195344/bgu-zoom-400x200.jpg)
Researchers extract personal data from video conference screenshots
Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
DDoS attacks could affect next generation 911 call systems
Despite a previous warning by Ben-Gurion University of the Negev (BGU) researchers, who exposed vulnerabilities in 911 systems due to DDoS attacks, the next generation of 911 …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Researchers trick autonomous car autopilot with phantom images
Researchers from Ben-Gurion University of the Negev’s (BGU) Cyber Security Research Center have found that they can trick the autopilot on an autonomous car to …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Researchers develop new optical stealth encryption technology
The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094153/keyboard1-400x200.jpg)
New user keystroke impersonation attack uses AI to evade detection
A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …
![leak](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113929/leak-400x200.jpg)
A botnet of smart irrigation systems can deplete a city’s water supply
Ben-Gurion University of the Negev (BGU) cyber security researchers warn of a potential distributed attack against urban water services that uses a botnet of smart irrigation …
![wallet](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102045/wallet-400x200.jpg)
Exfiltrating private keys from air-gapped cold wallets
Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege