News
  • "It’s Disturbingly Easy to Trick AI into Doing Something Deadly"
    Recent studies conducted by artificial intelligence (AI) researchers emphasize the major impacts that adversarial machine learning (ML) can have on safety. Researchers have performed adversarial attacks on machine learning systems to demonstrate how easy…
  • "Making Scalable On-Chip Security Pervasive"
    The growth of Internet of Things (IoT) is accompanied by the increase in accessible devices and the number of complex chip designs needed for their operation. The rapid growth of IoT devices calls for the advancement of chip-level security. According to…
  • "Photons Trained for Optical Fiber Obstacle Course Will Deliver Stronger Cyber Security"
    The navigation of photons in networks of optical fibers will be improved through the use of a new technique demonstrated by researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. This new approach is…
  • "TrickBot Trojan seeks out weak human links in business to profit from the tax season"
    During tax season, there is usually an increase of Phishing attacks that occur.  Many Phishing attacks this year are focused on the business segment and deployment of the TrickBot Trojan.  The phishing schemes are designed to…
  • "Cybercriminals (Still) Using Facebook as a Black Market"
    Cisco's Talos security researchers have found that cybercriminals are using Facebook groups for the purpose of conducting illegal activities, including selling hacking services and sensitive information such as credit card numbers. Researchers were able…
  • "Researchers Uncover US-Based Malware Distribution Centre"
    Security researchers at Bromium have discovered the use of U.S.-based web servers to host and distribute 10 types of malware via large-scale phishing campaigns. According to researchers, these web servers are owned by FranTech Solutions, a bulletproof…
  • "What Is Shadow Mining and Why Is It a Security Threat?"
    The results of a survey recently conducted by Exabeam to which 150 cybersecurity professionals responded, indicate that most organizations lack awareness surrounding the threat of shadow mining and cryptojacking. The performance of shadow mining refers…
  • HoTSoS 2019 Best Paper and Poster Awards
    The Hot Topics in Science of Security (HoTSoS) Best Paper Award recognizes the paper that exhibits outstanding achievement in science. Papers are selected by the HoTSoS Program Committee. The winning paper is automatically nomination into the…
  • "Xiaomi's Phones Had a Security Flaw Preinstalled on Millions of Devices"
    Smartphones made by Xiaomi, a Chinese technology company, were discovered by researchers from Check Point to contain a security vulnerability that could allow hackers to steal data, install tracking apps, and more. According to researchers, the…
  • "The war between cybersecurity and cybercrime will be fought by artificial intelligence"
    The battle between cybercrime and cybersecurity will soon be fought by artificial intelligence.  AI is being used more and more to launch attacks using botnets by hackers, and also AI algorithms are helping cybersecurity experts …
  • "How Malevolent Machine Learning Could Derail AI"
    Dawn Song is a professor at UC Berkley whose focus is on the security risks associated with artificial intelligence (AI) and machine learning (ML). Song recently gave a presentation at EmTech Digital, an event created by MIT Technology Review, in which…
  • "Healthcare’s Huge Cybersecurity Problem"
    Healthcare has increasingly become one of the most targeted industries for cyberattacks as indicated by recent reports of ransomware attacks and other attacks. Cyberattacks against the healthcare industry are on the rise on account of the lack of…