News
-
“Hackers Infected over 500,000 Routers with Potential to Cut Off Internet"A malware known to security researchers as VPNFilter has hit over 500,000 routers and other devices in 54 countries. VPNFilter can steal login and password data, monitor web activity, and shutdown the routers themselves.The article further discusses…
-
"Bank Robbing? There's a Vulnerable Web App for That"Positive Technologies recently published a report called Bank Attacks 2018. The report highlights the vulnerability of banks to attacks launched by cybercriminals due to insider threats and security flaws contained by financial web applications. This…
-
"Internet of Things: Who Is Watching You?"Pwnie Express conducted a survey to which hundreds of IT security professionals responded. The results of this survey indicate that the concerns of information security professionals surrounding the security threats posed by IoT devices have…
-
"After Meltdown and Spectre, Another Scary Chip Flaw Emerges"Following the discovery of critical processor vulnerabilities earlier this year, called Meltdown and Spectre, another major flaw has been discovered to be contained by Intel, AMD, and ARM processors. The exploitation technique of the recently disclosed…
-
"The Pentagon Has a Plan to Verify Identity via Smartphones"A project funded by the United States Department of Defense aims to implement new technology into smartphones that could verify the identity of users and assign risk scores. The technology will verify the identity of a user by analyzing attributes that…
-
"Wicked Botnet Uses Passel of Exploits to Target IoT"A new variant of the Mirai botnet by the name of Wicked has emerged. According to security researchers at Fortinet, Wicked makes use of at least three exploits to target unpatched IoT devices. This article continues to discuss the Wicked botnet in…
-
"Researchers Developing Cancelable Combined Fingerprint and Finger Vein System"Biometric technology is being developed by researchers at Australia’s Edith Cowan University that can perform a scan of fingerprints and finger veins simultaneously. Researchers claim that the technology is resistant to spoofing attacks that could be…
-
Getting Started on Science Fair ProjectsWhat makes a great cyber science fair project? The SoS-VO has a node for that...
-
"Bolstering Government Vehicle Telematics Cybersecurity"The Department of Homeland Security Science and Technology Directorate (S&T) and the Department of Transportation’s Volpe National Transportation Systems Center (Volpe Center) worked together to strengthen the cybersecurity of government vehicle…
-
22 Students Recognized by the National Security Agency at ISEF 2018The National Security Agency Research Directorate recognized 22 students on Thursday. These students were selected for their outstanding research contributions. They were among the over 1,800 students presenting their research at the 2018 Intel…
-
"US Department of Homeland Security Reveals New Cybersecurity Strategy"The U.S. Department of Homeland Security (DHS) recently released its Cybersecurity Strategy. The strategy provides a framework to improve upon the execution of cybersecurity responsibilities as the cyber risk landscape continues to evolve. The strategy…
-
"Threat Intelligence Shows Tried and True Techniques Continue to Work for Hackers"New threat intelligence data shows that phishing and ransomware attacks continue to be largely used by malicious actors. These simple attacks remain highly successful for hackers. This article continues to discuss trends in industry cybercrime, attack…