News
  • "Apple ransom highlights danger of credential stuffing"
    On April 7, a group of hackers by the name of “Turkish Crime Family” claimed to have breached Apple’s databases, demanding that Apple pay $75,000 to prevent the leakage of millions of user credentials. Though Apple has stated that their…
  • "Bastille warns radio-based hacks pose risk to national infrastructure"
    Bastille, leader in enterprise threat detection via software-defined radio, is trying to bring more attention to the potential rise in radio frequency hacking. A recent case sparks concern as a hack was performed through radio frequencies of the Dallas…
  • "Automation Advancement: The Road to Emergent Security AI?"
    The increasing emergence of big data and IoT is cultivating more ideas for organizations as well as raising concerns about the security of network services and data. ABI Research predicts that security automation could significantly improve security…
  • "Attackers caught defacing sites with difficult to spot techniques"
    Sucuri researchers have discovered another rush of attacks targeting and vandalizing websites through the use of images, applying a technique that complicates the process of detection as well as the identification of the compromised site as…
  • "Inmates hid self-built PCs in the ceiling and connected them to prison network"
    Ohio Inspector General’s Office has released a report on an investigation that reveals the unauthorized access to Marion Correctional Institution’s network by two prison inmates, through the use of self-built PCs hidden in the ceiling of a…
  • HotSoS 2017 - Differential Privacy, CPS, and complex navigation of security issues - Highlighted Topics
    Differential Privacy, CPS, and complex navigation of security issues at HotSoS 2017
  • "Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects Them​"
    Security researchers, Charlie Miller and Chris Valasek, performed a demonstration two years ago that revealed the potential remote hacking of a vehicle through its internet connection to disable driving functionality. Since then, cybersecurity concerns…
  • "How criminals can steal your PIN by tracking the motion of your phone"
    Cyber researchers at Newcastle University have discovered that it is possible for hackers to crack PINs and passwords by using malicious websites and apps to spy on users just based on the motion of 25 different standard sensors integrated into most…
  • "Outer-Space Hacking a Top Concern for NASA’s Cybersecurity Chief"
    As NASA scientists continue to transmit and extract data to and from their Swift and Fermi satellites for further space examination, cybersecurity has become a greater issue. Projects have outlasted the expected life expectancy by over a decade,…
  • Science of Security 2016 Annual Report
    The Science of Security Annual Report details the progress of the activities in the Science of Security research initiative. The most recent annual report, published in April 2017, highlights the work done in Fiscal Year 2016. For more information about…
  • Science of Security 2017 Best Poster Award
    The HoTSoS Best Poster Award at the Hot Topics in Science of Security (HoTSoS) symposium recognizes cybersecurity research with scientific rigor, clarity of presentation, and global impact. It is to encourage scientists across multiple disciplines to…
  • "Urgent action needed to bolster cybersecurity for critical infrastructure"
    Further improvement of cybersecurity efforts to protect critical infrastructure is needed now more than ever. Through reports and recommendations, MIT experts emphasize the importance of the Trump administration taking action to develop a highly logical…