News
  • “‘Eavesdropper’ Vulnerability Exposes Millions of Private Conversations”

    Security researchers have discovered a vulnerability, which can be exploited by attackers to gain access to millions of user conversations and SMS messages sent by applications that use the Twilio service. The "Eavesdropper" vulnerability…

  • “Can Biology Show Us How to Stop Hackers?”

    ASU Now interviewed Stephanie Forrest, who is the director of ASU Biodesign Institute Center for Biocomputing, Security and Society, as well as a professor in the School of Computing, Informatics and Decision Systems Engineering. Forrest discussed…

  • “Hackers Claim to Defeat iPhone X 'Face ID' Authentication”

    Security researchers at Bkav, an information security firm based in Vietnam, claim to have defeated the facial-recognition system used to authenticate users of Apple’s newest iPhone. Researchers have carefully crafted a mask with the use of 3D printing,…

  • "The Pentagon Opened Up to Hackers—And Fixed"

    The execution of the first ever federal bug bounty program by the name of “Hack The Pentagon” showed promising results as multiple vulnerabilities within certain public-facing DoD websites were able to be resolved. The discovery of these security…

  • "The Challenge of Authenticating Real Humans in a Digital World"

    Authentication is a major part of our everyday lives as we use various forms of identification such as driver’s licenses, ID cards, passwords, passcodes, and more to prove our identities offline and online. Although the process of authentication is…

  • “Experts Find Faster Way to Exploit Infineon Chip Crypto Flaw”

    Over the weekend, two researchers by the names of Daniel J. Bernstein and Tanja Lange were able to reproduce an attack that exploited a known flaw in Infineon Technologies RSA chips called CVE-2017-15361, also know as ROCA (Return of the Coppersmith…

  • “Extortion-Based Cyber Attacks: the Next Evolution in Profit-Motivated Attack Strategies”

    Cyberattacks are expected to become significantly more devastating for companies in the coming year. As companies are increasingly taking action to defend against cyberattacks, attackers are expected to take on more volatile methods of launching…

  • "Shape Security Introduces BlackFish AI to Combat Credential Stuffing"

    Shape Security has recently released its BlackFish AI technology aimed at helping organizations detect credential stuffing attacks.  Attackers perform credential stuffing by using stolen account credentials derived from data breaches to access…

  • "Researchers Unveil Tool to Debug 'Black Box' Deep Learning Algorithms"

    Self-driving cars operate through the use of deep learning systems. Deep learning is a form of machine learning that uses layers of artificial neurons in an attempt to mimic the processing and merging of information performed by the human brain. Although…

  • "Many Brother Printers Vulnerable to Remote DoS Attacks"

    Researchers at Trustwave have warned of an unpatched vulnerability that would allow attackers to remotely disable Brother printers temporarily with the generation of DoS attacks. The vulnerability arises from an embedded HTTP Daemon (HTTPd) server by the…

  • "A 'Virtual Wall' That Improves Wireless Security and Performance"

    A team of researchers led by Dartmouth College has proposed a solution to improving upon wireless security and performance. The solution utilizes 3-D printing technology to develop a reflector, which can be used to direct wireless signals to areas where…

  • “When Ransomware Strikes: 7 Steps You Can Take Now to Prepare”

    When it comes to ransomware attacks, even the most prepared company can become a victim. Before an incident occurs, an emergency plan must be in place to ensure that a company can prevent as little damage to itself and its customers as possible. This…