News
-
"External Threats Outpace Insider-Related Breaches in Healthcare"According to the latest Verizon Data Breach Investigations Report (DBIR), the healthcare sector faced an increase in attacks last year with external threats exceeding the number of incidents caused by insiders. Verizon's DBIR highlights findings…
-
"Qatar: 'Huge' Security Weakness in COVID-19 Contact-Tracing App"Amnesty International discovered critical vulnerabilities in Qatar's mandatory coronavirus contact-tracing app, which have now been fixed. The app is intended to help slow down the spread of COVID-19 by alerting users when they are near someone who has…
-
"Florida Tech Student Finds Privacy Flaws in Connected Security and Doorbell Cameras"Florida Tech computer science student Blake Janes discovered systematic design flaws in internet-connected doorbells and security cameras manufactured by Ring, Nest, SimpliSafe, and eight other manufacturers. Janes found that a shared account can still…
-
"A New Android bug, Strandhogg 2.0, Lets Malware Pose as Real Apps and Steal User Data"Researchers at a security firm called Promon, have discovered a new vulnerability, called Strandhogg 2.0. This vulnerability affects all devices running Android 9.0 and earlier. This vulnerability lets malware imitate legitimate apps to steal…
-
"Android Security Vulnerabilities Differ by Country, Say Researchers"According to researchers at F-Secure, Android devices manufactured by Huawei, Samsung, Xiaomi, and others are being shipped and sold with significantly different levels of on-board security in different regions. The differences in Android security…
-
"Malware Opens RDP Backdoor Into Windows Systems"Researchers at SentinelOne have discovered a new version of the Sarwent malware. Sarwent is a malware that started as a loader for other malware but has recently been updated with more functionalities. The new variant of Sarwent can open…
-
SoS Musings #37 - The Double-Edged Sword of AI and MLSoS Musings #37 - The Double-Edged Sword of AI and ML
-
Cyber Scene #44 - Tracing Tracks: So Near Yet So Far AwayCyber Scene #44 - Tracing Tracks: So Near Yet So Far Away
-
Cybersecurity Snapshots #6 - Will Biometric Authentication Soon Replace Password Authentication?Cybersecurity Snapshots #6 - Will Biometric Authentication Soon Replace Password Authentication?
-
Spotlight on Lablet Research #6 - Contextual Integrity for Computer SystemsSpotlight on Lablet Research #6 - Project: Contextual Integrity for Computer Systems
-
"Hackers Can Target Rockwell Industrial Software With Malicious EDS Files"Rockwell Automation and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published advisories about vulnerabilities associated with the Electronic Data Sheet (EDS) subsystem discovered by researchers at the industrial cybersecurity firm…
-
The Queens of CodeThe Queens of Code will be presenting four talks about NSA’s Computing Women from the 60s, 70s, and 80s as part of the Cyber Center for Education & Innovation (CCEI) series on the NEPRIS platform. These computing pioneers contributed to early…