News
  • "What is GhostHook? New technique allows hackers to bypass Windows 10 PatchGuard"
    Security experts at CyberArk have discovered a new attack technique, called GhostHook, which could allow hackers to evade kernel protections of Windows 10 PatchGaurd and plant rootkits within systems. According to researchers, this technique is only…
  • "‘Breakthrough’ Cisco New Network Uses Machine Learning To Detect Malware In Encrypted Data"
    Cisco has revealed its new network, which uses machine learning for the automation and security of enterprise networks. As claimed by Cisco, this network marks a significant development for enterprise networks as machine learning has been implemented to…
  • "World's Most Powerful Particle Collider Taps AI to Expose Hack Attacks"
    CERN is the European Organization for Nuclear Research lab, which holds a computer grid that is used by thousands of physicists to view and examine data produced by the Large Hadron Collider for the purpose of further understanding the underlying…
  • CyberSTEM Camps at Maryland CyberSecurity Center (2017)
    MC2 facilitates a wide variety of educational opportunities on the UMD campus. MC2 also sponsors a number of educational/outreach events for lower-school, middle-school, and high-school students, especially targeting women and under-…
  • "Growing Cyberthreat: Steganographic Malware Hiding In Images"
    Steganographic malware uses a technique that inserts a secret algorithm into an image, which is then sent to a targeted system where the information embedded within the image is extracted by malicious software to launch an attack. This attack is stealthy…
  • "A Diabolical Way of Hacking a Chip With a Wave of Your Hand"
    Founder of Red Balloon Security, Ang Cui, and research scientist, Rick Housley, have discovered a new way in which a processor could be hacked, with the use of self-built electromagnetic pulsing equipment to raise faults within targeted hardware. This…
  • "Insider threats fastest growing cybersecurity concern"
    According to survey results published by Harvey Nash/KPMG and observations made by cybersecurity experts at Spohn Security Solutions, a large portion of threats to cybersecurity originate from within an organization and this type of security risk is the…
  • "Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access"
    Researchers have discovered a vulnerability known as Stack Clash that could allow an attacker to launch code via root access, which Linux, BSD, Solaris and other open source systems are vulnerable to. This article further discusses the risks posed by…
  • "Quantum Computing's Threat to Public-key Cryptosystems"
    There are concerns pertaining to what will be done about current public-key encryption when commercially viable quantum computers are fully available. Concerns arise from future quantum computing being able to break the current most popular public-key…
  • "Girl Scouts will offer new cybersecurity badges to increase its STEM focus"
    The Girl Scouts organization will be collaborating with Palo Alto Networks, an internet security company, to implement 18 new badges, which will recognize skills in cybersecurity. These badges will promote the learning of a variety of cyber topics,…
  • "New Vulnerability Could Give Mirai the Ability to Survive Device Reboots"
    A new vulnerability discovered by researchers from Pen Test enables infections from the Mirai IoT worm and other IoT malware to remain on devices, despite their reboots. Consequently, this vulnerability could lead to the development of permanent IoT…
  • "Scientists Make Quantum Leap Toward Secure Quantum Internet"
    Researchers at the University of Science and Technology in Hefei, China have made major headway for a global quantum secure internet. This development makes significant advancements to the confidentiality of data as the workings of subatomic particles…