News
-
"Attackers caught defacing sites with difficult to spot techniques"Sucuri researchers have discovered another rush of attacks targeting and vandalizing websites through the use of images, applying a technique that complicates the process of detection as well as the identification of the compromised site as…
-
"Inmates hid self-built PCs in the ceiling and connected them to prison network"Ohio Inspector General’s Office has released a report on an investigation that reveals the unauthorized access to Marion Correctional Institution’s network by two prison inmates, through the use of self-built PCs hidden in the ceiling of a…
-
HotSoS 2017 - Differential Privacy, CPS, and complex navigation of security issues - Highlighted TopicsDifferential Privacy, CPS, and complex navigation of security issues at HotSoS 2017
-
"Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects Them"Security researchers, Charlie Miller and Chris Valasek, performed a demonstration two years ago that revealed the potential remote hacking of a vehicle through its internet connection to disable driving functionality. Since then, cybersecurity concerns…
-
"How criminals can steal your PIN by tracking the motion of your phone"Cyber researchers at Newcastle University have discovered that it is possible for hackers to crack PINs and passwords by using malicious websites and apps to spy on users just based on the motion of 25 different standard sensors integrated into most…
-
"Outer-Space Hacking a Top Concern for NASA’s Cybersecurity Chief"As NASA scientists continue to transmit and extract data to and from their Swift and Fermi satellites for further space examination, cybersecurity has become a greater issue. Projects have outlasted the expected life expectancy by over a decade,…
-
Science of Security 2016 Annual ReportThe Science of Security Annual Report details the progress of the activities in the Science of Security research initiative. The most recent annual report, published in April 2017, highlights the work done in Fiscal Year 2016. For more information about…
-
Science of Security 2017 Best Poster AwardThe HoTSoS Best Poster Award at the Hot Topics in Science of Security (HoTSoS) symposium recognizes cybersecurity research with scientific rigor, clarity of presentation, and global impact. It is to encourage scientists across multiple disciplines to…
-
"Urgent action needed to bolster cybersecurity for critical infrastructure"Further improvement of cybersecurity efforts to protect critical infrastructure is needed now more than ever. Through reports and recommendations, MIT experts emphasize the importance of the Trump administration taking action to develop a highly logical…
-
"Regulators Warn of Man-in-the-Middle Attack Risks"Federal regulators are alerting healthcare sector entities about how some of the end-to-end security products being utilized in their systems, could be vulnerable to man-in-the-middle attacks. This warning also applies to Secure Hypertext Transport…
-
"Hackers are attacking Word users with new Microsoft Office zero-day vulnerability"Security researchers at McAfee have recently discovered a vulnerability in Microsoft Word that could be exploited by hackers to stealthily launch different types of malware even on computers that are fully patched. All versions of Microsoft Office are…
-
"Hard-coded passwords put industrial systems at risk"Researchers from German firm OpenSource Security have revealed that SCADA has been distributing products with passwords embedded within the firmware which is also unchangeable. Hard-coding passwords into a system poses serious risks for connected…