-
"New VPN Flaws Highlight Proven Pathway for Hackers Into Industrial Organizations"Industrial companies have been advised to secure their Virtual Private Network (VPN) connections used by employees for remote connectivity in order to avoid providing entry points for hackers seeking sensitive data. This advice is even more essential now…
-
"Randomness Theory Could Hold Key to Internet Security"The question about whether there is an unbreakable code has been central to cryptography and efforts to maintain the security of personal information on the internet. In a new paper, titled "On One-Way Functions and Kolmogorov Complexity," Cornell Tech…
-
"Source Code From 50+ Companies, Including Nintendo, Microsoft and Adobe, Published Online"Researchers have discovered source code from dozens of companies that have been published online on public repositories. Some of the companies affected include Microsoft Corp., Adobe Systems Inc., Lenovo Group Ltd., Advanced Microsoft Devices Inc…
-
"No Honor Among Cyber Thieves"A study published in the June edition of Social Science Computer Review examined user activity on two online carding forums, which are cybercrime marketplaces (illegal sites) dedicated to sharing stolen credit card information. Instances of online…
-
"Attackers Are Exploiting Cisco ASA/FTD Flaw in Search For Sensitive Data"Researchers have discovered that an unauthenticated file read vulnerability (CVE-2020-3452) is now being exploited in the wild. The vulnerability affects the Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) software…
-
Inscrypt, the International Conference on Information Security and Cryptology 2019Inscrypt, the International Conference on Information Security and Cryptology 2019
-
SoS Musings #39 - Cryptographers Prepare for the Arrival of Quantum ComputersSoS Musings #39 - Cryptographers Prepare for the Arrival of Quantum Computers
-
Cyber Scene #46 - Virus Central: Vulnerabilities of Many ColorsCyber Scene #46 - Virus Central: Vulnerabilities of Many Colors
-
Cybersecurity Snapshots #8 - Is Your Home Router Secure?Cybersecurity Snapshots #8 - Is Your Home Router Secure?
-
Spotlight on Lablet Research #8 - Uncertainty in Security AnalysisSpotlight on Lablet Research #8 - Project: Uncertainty in Security Analysis Lablet: University of Illinois at Urbana-Champaign
-
"Attackers Have Created a Specialized Economy Around Email Account Takeover"Barracuda Networks released a report on how cybercriminals are gaining access to email accounts, how they use compromised accounts, and how organizations can protect their accounts against attacks. The report also highlights a specialized economy…
-
Pub Crawl #40Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
News