News
-
"4.83 Million DDoS Attacks Took Place in The First Half of 2020, a 15% Increase"Researchers at Netscout witnessed a radical change in DDoS attack methodology in the first half of 2020. DDoS attack methodology shifted to shorter, faster, hard-hitting, complex multi-vector attacks. The researchers discovered that 4.83…
-
"Joker Trojans Flood the Android Ecosystem"Researchers at Zcaler in September saw dozens of Joker malware variants hitting Google Play and third-party app stores. They found 17 different samples of Joker being regularly uploaded to Google Play. Collectively the applications carrying the Joker…
-
"Breach at Software Provider to Local Governments, Schools"Tyler Technologies is a major provider of software services for governments and schools across the US that has recently revealed that an unknown intruder compromised its phone and information systems. Tyler provides service for court management systems,…
-
"3D Biometric Authentication Based on Finger Veins Almost Impossible to Fool"Biometric authentication methods rely on unique biological characteristics for identity verification. These methods are continuing to replace traditional passwords. A team of researchers developed a new biometric authentication method that is based on 3D…
-
"Multiple Wireless Router Chipsets Affected by Authentication Bypass Vulnerability"Synopsys CyRC published an advisory detailing an authentication bypass vulnerability contained by various wireless router chipsets. This vulnerability impacts chipsets in different devices manufactured by Mediatek, Qualcomm, and Realtek. The exploitation…
-
"Universal Health Services Ransomware Attack Impacts Hospitals Nationwide"In the early hours of Monday morning, Universal Health Services (UHS), a Fortune-500 owner of a nationwide network of hospitals, was hit with a ransomware attack. UHS has not mentioned the kind of attack it has suffered, but information from…
-
Cyber Scene #48 - From Digits to Global Cyber WarsCyber Scene #48 - From Digits to Global Cyber Wars
-
Cybersecurity Snapshots #10 - Organizations Need to Take Bluetooth Security SeriouslyCybersecurity Snapshots #10 - Organizations Need to Take Bluetooth Security Seriously
-
Spotlight on Lablet Research #10 - Model-Based Explanation for Human-in-the-Loop SecuritySpotlight on Lablet Research #10 - Model-Based Explanation for Human-in-the-Loop Security Lablet: Carnegie Mellon University
-
Pub Crawl #42Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.