News
-
"'Instant Replay' for Computer Systems Shows Cyber Attack Details"Cybersecurity researchers at the Georgia Institute of Technology are developing a new software system called Refinable Attack Investigation (RAIN). This new system will significantly improve upon the examination of the extent and impact of network or…
-
Cyber Scene #14 - Trick or Treat?Cyber Scene #14 Trick or Treat? OLD HAUNTS China: 1,000 cyber flowers
-
"This New Kind of AI Can Breach Anti-Bot Security by Thinking Like a Human"With the use of a new type of neural network by the name of Recursive Cortical Network (RCN), the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) can now be defeated. CAPTCHA is a security system that is widely used…
-
MIT issues Digital DiplomasI know, completing a degree in college was all about getting the sheepskin. Well a sign of advancement, MIT has annouced that they are debuing digital diplomas. It isn't so much as replacing the diploma with an image on your cell phone but making it…
-
SoS Musings #7 - Building Blocks for Security ScienceSoS Musings #7 Building Blocks for Security Science
-
"Is your organization receptive to adopting new Cybersecurity technology?"Sandia National Laboratories is working to enhance the cybersecurity adoption process by gaining insight from many organizations. To help identity barriers, take a quick survey. At the end you will be given feedback on potential barriers your…
-
"Google Security: Company Adds 'Advanced Protection Program' For High-Risk Users"Google has announced the launch of its Advanced Protection Program, which aims to provide new additional security options to users, particularly those who are more likely to be targeted by attackers online. This new program supports enhanced two-…
-
"Hackers Take Aim at SSH Keys in New Attacks"Hackers have intensified their scanning of servers hosting WordPress websites in order to gather SSH private keys. Upon further investigation after a customer reported scans being performed on their live traffic for SSH private keys, it has been…
-
"10 Social Engineering Attacks Your End Users Need to Know About"The Verizon Data Breach Investigations Report has revealed that 43 percent of breaches within the last year were a result of social engineering attacks. Attackers are using more nontraditional methods of performing social engineering attacks to steal…
-
"Majority of Java Apps Are Susceptible to Hack Attacks"Findings of the 2017 State of Software Security Report released by Veracode, emphasizes the importance of patching open source components used within applications to prevent security breaches. An overwhelming majority of Java applications consist of at…