News
-
"Delaware Announces Innovative Cybersecurity Partnership for Young Women"A partnership between the SANS Institute and the State of Delaware was announced by Governor John Carney and Delaware’s Chief Information Officer (CIO) James Collins. The partnership is in support of providing cybersecurity training to young women in…
-
"National Cybersecurity Center Opens in Colorado"The National Cybersecurity Center (NCC), which aims to provide a central space for cybersecurity advancements, opened in Colorado Springs. The center is dedicated to cybersecurity research, as well as cybersecurity training and education for students,…
-
“Satori Author Linked to New Mirai Variant Masuta”In a report released Tuesday by NewSky Security researchers have identified two more Mirai variants: Masuta and PureMasuta. The two variants use a Simple Object Access Protocol (SOAP) exploit, allowing the actor to bypass authentication and in return…
-
NSF Releases S&E Indicators 2018The National Science Foundation has released their report on Science and Engineering indicators in education; workforce; R&D; industry, technology, and the global marketplace; invention, knowledge transfer, and innovation; and public attitudes and…
-
Call for Proposals: Handbook of Military and Defense Operations ResearchJames Howard and I are editing a new title from CRC Press, Handbook of Military and Defense Operations Research. We are seeking case studies, essays, and positional papers to illustrate applications of operations research and analytics…
-
SoS Musings #10 - 2018 Internet Security and RegulationsSoS Musings #10 2018 Internet Security and Regulations Around the new year articles predicting internet security start popping up. 2018 is not different.
-
"Study Finds Top Sites Can Be Impersonated Using Non-Latin Alphabet"A study conducted by Farsight Security reveals the use of Internationalized Domain Names (IDNs) to impersonate 125 top brand websites, including Apple, Amazon, Google, Microsoft, Facebook, and many more. IDN homograph attacks use non-Latin alphabets to…
-
"6 Ways Hackers Will Use Machine Learning to Launch Attacks"As artificial intelligence and machine learning are expected to significantly improve upon cybersecurity defenses, hackers are also expected to utilize such technologies in the launch of highly sophisticated cyberattacks. Adversarial machine learning is…
-
"Real-world Intercontinental Quantum Communications Enabled by the Micius Satellite"Intercontinental quantum key distribution (QKD) was successfully demonstrated through the use of a satellite by the name of Micius, which was developed by a team of scientists from the Chinese Academy of Sciences. An experiment conducted by scientists…
-
"How Threat Hunting Enhances Cybersecurity"As the frequency of cyberattacks continues to grow at a significant rate, organizations should take a proactive approach to protect their networks against such attacks. Threat hunting is a way in which organizations could proactively secure their…
-
"One-Quarter of Ethical Hackers Don't Bother Reporting Bugs Due to Lack of Disclosure Policies"HackerOne conducted a survey to which 1,698 members of the ethical hacking community responded. One-quarter of the ethical hackers that responded to the survey reveal that they do not report discovered vulnerabilities as affected companies lack…
-
“Meltdown-Spectre: Intel says newer chips also hit by unwanted reboots after patch”Intel released an update on the effects of its Meltdown-Spectre patches for newer CPUs on Wednesday, stating that some the patches cause the same unwanted and more frequent reboots as they do for the older CPUs. Following this, Intel has also…