News
  • SoS Musings #21 - VR and AR Adventures in Cybersecurity​​​​​​​
    SoS Musings #21 VR and AR Adventures in Cybersecurity
  • "Security Flaws Let Anyone Snoop on Guardzilla Smart Camera Video Recordings"
    Researchers at 0DayAllDay have uncovered security vulnerabilities in a popular indoor wireless security system sold by Guardzilla. These vulnerabilities are serious in that they could allow hackers to access Guardzilla's cloud storage and video…
  • "Idaho Lab Protects US Infrastructure from Cyber Attacks"
    The Idaho National Laboratory's cybersecurity program aims to enhance the security of U.S. critical infrastructure systems that are used to control water systems, energy pipelines, nuclear power plants, and more, against cyberattacks. The manipulation of…
  • "Hackers Make a Fake Hand to Beat Vein Authentication"
    Biometrics is becoming a popular method of authentication. With biometric authentication, users can be identified and verified based on their physical characteristics such as face, voice, fingerprints, veins, and more. Vein recognition is a…
  • "HolaVPN Is a Massive Security Risk, Security Researchers Warn"
    Trend Micro Inc. recently warned of the significant security risks posed by the widely-used virtual private network provider, HolaVPN. Users are urged to cease their use of HolaVPN as the data sent via this service has been found to be unencrypted.…
  • "Protecting Critical Internet Infrastructure from IoT Device Risks"
    IoT devices continue to pose security risks to operational networks such as those used by federal agencies. These security risks must be prevented as such networks are important for the protection of our nation's critical infrastructure. This article…
  • "The Benefits and Limitations of AI in Cybersecurity"
    A survey conducted by Osterman Research to which over 400 U.S. security analysts who work in large organizations responded, show trends and attitudes surrounding the use of AI in cybersecurity. The results of this survey indicate that AI is…
  • "'Hack the Air Force' Bug Hunting Challenge Uncovers 120 Flaws in Websites and Services"
    A bug bounty program launched by the U.S. Department of Defense (DoD), called Hack the Air Force, allowed hackers to find and report security vulnerabilities contained by public-facing Air Force websites and services. Hackers that participated in the…
  • "Attackers Are Using Cloud Services to Mask Attack Origin and Build False Trust"
    According to a report released by Menlo Security, the padlock in a browser’s URL bar gives users a false sense of security as cloud hosting services are being used by attackers to host malware droppers. The use of this tactic allows attackers to hide the…
  • "Anti-Hacker Team Develops Data Sharing Scheme for Cloud Storage"
    Data security continues to be a challenge in cloud computing. An approach to improving the security of information in cloud computing environments has been suggested by scientists from the Laboratory of Problem-Oriented Cloud Computing at South Ural…
  • "How a Personality Trait Puts You at Risk for Cybercrime"
    Researchers at Michigan State University conducted a study that examines the behaviors that could lead people to becoming victims of cybercrime. According to the study, those who lack self-control are more likely to fall victim to cyberattacks such as…
  • "Better Security Achieved with Randomly Generating Biological Encryption Keys"
    A team of engineers at Penn State University has proposed a way in which the security of data could be improved. The engineers suggest the random generation of encryption keys through the use of living cells. Such encryption keys would be impossible…