News
  • "Computer Security Researchers: WPA3 Could Have Been Better, Stronger"
    Simultaneous Authentication of Equals (SAE) is a security enhancement provided by WPA3 that aims to prevent attacks such as the WPA2 KRACK attack discovered in 2016. The KRACK attack interferes with the four-way handshake method of the WPA2 protocol.…
  • "Personal Cyber Insurance Added to Homeowner Policy"
    Saga is an insurance provider that has recently announced the launch of personal cybercrime insurance. The Personal Cybercrime coverage will provide protection to individuals from cyber risks on their personal devices. This article continues to discuss…
  • "First IoT Security Bill Reaches Governor's Desk in California"
    California’s SB-327 is an Internet of Things (IoT) security bill that has now been approved and sent to Gov. Jerry Brown’s desk to be signed. The Internet of Things Cybersecurity Improvement Act of 2017 was introduced in February 2017 and aims to improve…
  • "What Can We Do to Reverse the Cybersecurity Skills Shortage?"
    Bharat Mistry, Principal Security Strategist at Trend Micro, further discusses the issue of the cybersecurity skills shortage. The shortage must be addressed as cyber threats faced by governments and businesses continue to grow in frequency and…
  • "Tesla’s New Bug Bounty Protects Hackers — and Your Warranty"
    Tesla’s updated product security policy has declared that it will allow car owners to hack their own cars as long as they follow the rules of the company’s bug bounty program. The change is significant to security researchers as they will be…
  • "One of Most Popular Mac Apps Acts Like Spyware"
    A top-selling Mac app, called Adware Doctor, has been discovered by security researchers to be performing spyware activities. According to researchers, the app has been collecting data pertaining to its users and sending that data to a server in…
  • Game-theoretic Paper Wins Annual Paper Competition
    The winner of the 6th Annual Best Scientific Cybersecurity Paper Competition is How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games by Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David…
  • "Army Research Takes Proactive Approach to Defending Computer Systems"
    There has been an advancement in the development of moving target defense (MTD) techniques for defending computer systems against cyberattacks by a team of researchers from the U.S. Army Research Laboratory, University of Canterbury in New Zealand, and…
  • "7 Ways Blockchain is Being Used for Security"
    Blockchain technology can be used as a tool to enhance security in a number of ways. The security of critical infrastructure, data, and more, can be improved through the use of blockchain technology. This article continues to discuss the growing…
  • "Do You Know How and Why You Forget Passwords?"
    A study led by Rutgers University–New Brunswick explores the reasons why people often fail to remember their passwords to accounts and websites. Findings of this study are expected to help in the improvement of password technology. The study…
  • "A Well-Known Hacking Group Is Getting Better at Evading Detection"
    A report recently released by Palo Alto Networks highlights the techniques used by the Iranian-linked hacker group, OilRig, to avoid being detected. A trojan used by the hacking group, called OopsIE, has been discovered by researchers to be able to…
  • "Hacker Using MikroTik Routers to Eavesdrop on Internet Traffic"
    Attackers have been exploiting a flaw contained by unpatched MikroTik routers in order to perform eavesdropping on users’ network traffic. According to Netlab researchers, over 7,500 MikroTik routers in countries including Russia, Iran, Brazil, and the…