News
  • "Security Researchers Found Vulnerabilities at AT&T, T-Mobile, and Sprint That Could Have Exposed Customer Data"

    Flaws have been discovered in systems used by AT&T, Sprint, and T-Mobile that put customer data at risk of being accessed by attackers. The vulnerabilities discovered by security researchers could allow malicious actors to perform brute-force attacks…

  • "Control System Simulator Helps Operators Learn to Fight Hackers"

    A control simulator, called the Graphical Realism Framework for Industrial Control Simulations (GRFICS), has been developed to help operators of industrial facilities such as chemical processing plants, water purification plants, and more, build their…

  • "Would You Lock a Password Inside DNA?"

    A startup company called Carverr is providing a way to enhance the level of security for cryptocurrency passwords that involves the use of synthetic DNA. The service provided by Carverr allows customers to store their cryptocurrency passwords in DNA as…

  • "Iranian Threat Group Targets Universities"

    An Iranian cyber threat group known as Cobalt Dickens has been linked to the launch of a credentials theft campaign targeting universities. Security researchers at Secureworks discovered a large number of spoofed domains aimed at stealing credentials for…

  • "A New Pacemaker Hack Puts Malware Directly on the Device"

    Pacemakers and implantable insulin pumps, manufactured by Medtronic, have been discovered by researchers to be vulnerable of being controlled by hackers. Vulnerabilities found in Medtronic's software delivery network can allow hackers to execute…

  • "Hacking Smart Plugs to Enter Business Networks"

    A buffer overflow flaw has been discovered in Belkin’s Wemo Insight Smart Plug by researchers at McAfee. A smart plug enables whatever is plugged into it to be remotely switched on or off via an app. The vulnerability found in the Wemo smart plug could…

  • "Security Flaws in Police Body Cameras Open the Devices to Attack"

    A number of security vulnerabilities have been discovered in body cameras used by the police. An analysis of bodycams from Vievu, Patrol Eyes, Fire Cam, Digital Ally, and CeeSc, reveals the presence of vulnerabilities that can allow attackers to perform…

  • "Pushing Cybersecurity for Counties"

    In support of strengthening the cybersecurity of counties, the National Association of Counties and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are collaborating in the encouragement of counties to join MS-ISAC’s cybersecurity…

  • "A Monitor’s Ultrasonic Sounds Can Reveal What’s on the Screen"

    A team of researchers have presented an acoustic side-channel attack that could be used by hackers to gain information pertaining to what is being displayed on a computer monitor. The attack can be performed by analyzing the ultrasonic sounds produced by…

  • SoS Musings #17 - Hacking Bodies and Networks

    SoS Musings #17 Hacking Bodies and Networks

  • "It Takes an Average 38 Days to Patch a Vulnerability"

    A new report published by TCell reveals findings of an examination of over 316 million security incidents, which highlight trends surrounding web application attacks. According to the report, the top five most common types of attacks on web…

  • "Hackers Target Smartphones to Mine Cryptocurrencies"

    Cryptojacking is a cyberattack in which the processing power of a computing device is hijacked to perform cryptocurrency mining. The targeting of smartphones by hackers to perform cryptojacking is increasing as indicated by recent discoveries of mobile…