News
  • "Threat Intelligence Computing for Efficient Cyber Threat Hunting"
    A cyber reasoning paradigm has been developed by IBM researchers for the purpose of establishing and easing the process of discovering cyber threats. The paradigm, called threat intelligence computing (TIC), improves upon the observation of cyber facts,…
  • Learn and Teach Robot Hacking
    Cyber-Physical Systems (CPS) Cybersecurity Curriculum Free curriculum with supporting technologies to introduce students to the exciting field of cybersecurity. Enable K-12 educators and students to understand the methods of hacking and defensive…
  • "Army Researcher Minimizes the Impact of Cyber-Attacks in Cloud Computing"
    An algorithm has been developed by a team of researchers to reduce the effects of potential cybersecurity attacks within the cloud computing environment. The algorithm addresses cybersecurity concerns surrounding the hypervisor in cloud computing. This…
  • "SEC Warns Corporate Cyber Weakness Could Violate Federal Law"
    The U.S. Securities and Exchange Commission (SEC) has issued a warning pertaining to the potential violation of federal law by companies that do not implement sufficient cybersecurity controls. The warning highlights the duty of all public companies to…
  • "Study Exposes Security Vulnerabilities in Terahertz Data Links"
    Terahertz data links are expected to be used in future wireless networks with their inherent security improvements and ability to carry a significantly higher amount of data than microwaves used in today's wireless networks. However, findings of a study…
  • "Toward Unhackable Communication: Single Particles of Light Could Bring the 'Quantum Internet'"
    An advancement in quantum communication has been made by researchers at Purdue University, which increases chances of successfully transmitting large pieces of sensitive information using particles of light, called photons. This development is a…
  • "UK Launches 'World First' IoT Code of Practice"
    A Code of Practice (CoP) aimed at helping manufacturers strengthen the security of IoT devices was recently released by the UK government. HP Inc. and Centrica Hive Ltd are the first IoT manufactures to sign up in agreement with the code. This article…
  • "35 Million Voter Records from 19 States for Sale on Hacking Forum"
    Anomali Labs and Intel 471 researchers discovered over 35 million 2018 U.S. voter records from 19 states being sold on a dark web forum. The voter registration data records reveal full names, phone numbers, physical addresses, and more. This article…
  • "Scaling the IoT Product Security Lifecycle with Automation"
    Recent security incidents involving IoT devices call for the use of a different approach to securing such devices. Automation is a recommended method for improving upon the IoT security process. This article continues to discuss the issues…
  • "Facebook Says Hackers Accessed Data of 29 Million Users"
    50 million Facebook accounts were initially reported to have been affected in a breach faced by the social media giant in late September. However, the company has recently reported that fewer accounts were actually impacted in the breach. According to…
  • "Computer Science Research Aids in Mitigating Cyberthreats in Vehicles"
    As car systems have been shown to be vulnerable to cyberattacks, researchers have developed a way in which cyberattacks on such systems could be detected. The detection system makes use of a neural network in the recognition of anomalies in car…
  • "Many of the U.S. Military’s Newest Weapons Have Major Cyber Vulnerabilities: GAO"
    A new report from the Government Accountability Office (GAO) reveals the presence of mission critical cyber vulnerabilities in many weapons used by the U.S. military, including those that are currently being developed. According to the report, these…