News
  • Adam's RSA Trip Report
    This year, I had a great opportunity. I got to travel to the RSA Conference and be both an attendee and also help represent Science of Security and Privacy at the agency’s booth. I tried to update the VO each day of the conference, but I found I didn’t…
  • "Millions of Fibre Broadband Routers Open to Remote Control by Hackers"
    Security researchers at VPN Mentor have discovered critical flaws contained by fiber-optic routers. The vulnerabilities could allow hackers to evade authentication and take control over the devices. This article continues to discuss the vulnerabilities…
  • "Flaws in Critical-Infrastructure Software Could Have Meant Catastrophe"
    Security researchers from Tenable discovered vulnerabilities in two widely used critical-infrastructure software programs made by Schneider Electric. The software programs are commonly used at manufacturing sites, solar power facilities, power plants,…
  • "This Malware Checks Your System Temperature to Sidestep Sandboxing"
    GravityRAT is a Trojan that is able to circumvent research efforts through the performance of thermal readings. The Trojan checks the temperature of systems in order to detect the operation of virtual machines (VM) used for sandboxing. This article…
  • "Car Hackers Find Remotely Exploitable Vulnerabilities in Volkswagen and Audi Vehicles"
    Multiple vulnerabilities have been discovered in Volkswagen and Audi vehicles. According to security researchers from Computest, the exploitation of these vulnerabilities could allow hackers to listen in on drivers and perform real-time car tracking…
  • "How Hackers Could Cause Chaos on America's Roads and Railways"
    The Colorado Department of Transportation faced ransomware attacks earlier this year, which had a significant impact on the agency's operations. These cyberattacks highlight the importance of strengthening cybersecurity protections for transportation…
  • "Cybersecurity Teams That Don't Interact Much Perform Best"
    A recent study conducted by Army scientists indicates that successful high-performing cybersecurity teams have fewer interactions among team members. The observation was made from the study of how cyber defense teams coordinated and performed in…
  • "Emerging Memory Devices Used to Develop Electronic Circuits for Cybersecurity Applications"
    Dmitri Strukov, a computer science professor at UC Santa Barbara, and his team are working to strengthen the security of IoT devices through the implementation of a chip that utilizes ionic memristor technology. The use of this technology prevents the…
  • Pub Crawl #16
     
  • "How Microsoft, Amazon, Alphabet Are Reshaping Security"
    Tech giants, Microsoft, Amazon, and Alphabet, are expected to significantly alter the cybersecurity landscape.  The shift will derive from the implementation of security surrounding the cloud. This article continues to discuss how Microsoft, Amazon…
  • "DHS Plans To Formalize Bug Disclosure Policy"
    The Department of Homeland Security (DHS) is working to establish a clearer process for ethical hackers to follow in the disclosure of hackable vulnerabilities found to be contained by the department’s systems. In addition to formalizing a policy for…
  • "Disguising Access Patterns to Protect Sensitive Data in the Cloud"
    Sensitive data stored in the cloud can be encrypted, but the way in which it is accessed by users can still leave it vulnerable to hackers. Wensheng Zhang, an associate professor of computer science at Iowa State University highlights the possibility of…