News
  • "5 Ways to Improve Collaboration Among Security Professionals"
    It is important to strengthen collaboration between security practitioners in order to increase the sharing of cyber threat intelligence. The enhancement of information-sharing among security professionals would help in the advancement of security…
  • "Hacker Honeypot Shows Even Amateurs Are Going After ICS Systems"
    A honeypot experiment conducted by researchers from Cybereason brings attention to the targeting of industrial control systems (ICS) by less-skilled hackers. The infiltration of amateur hackers into such systems raises concerns as the mistakes made by…
  • "FBI in Smart Device Security Warning"
    The FBI has recently warned of the dangers posed by IoT devices when they are inadequately secured. The notice released by the FBI highlights the use of compromised IoT devices as proxies for cyber actors to preserve anonymity in the performance of…
  • "Improved Passphrases Could Make Online Experiences Both User-Friendly and Secure"
    Passphrases have been proven to offer a higher level of security than traditional passwords. However, human factors issues such as typos and memorability have hindered the widespread adoption of passphrases. Researchers, Kevin Juang and Joel Greenstein,…
  • "iPhone Chipmaker Races to Recover After Crippling Computer Virus"
    Computer systems and fab tools belonging to Taiwan Semiconductor Manufacturing Co. (TSMC), a major supplier of chips for Apple Inc.’s iPhones, were recently infected by a virus. According to TSMC, an error made in the process of software installation for…
  • “FireEye Brings Machine Learning to Endpoint Security with MalwareGuard”
    FireEye has announced that a machine learning based software called MalwareGuard to its FireEye Endpoint Security agent. FIreEye has armed MalwareGuard with two years of extensive training, all aimed toward detecting and mitigating cyber attacks to…
  • Summer '18 Quarterly Lablet Meeting: Chicago Dogs, Deep Dish, and talk of Tech Transfer
    Day 1 began with a briefing from Nadia Carlsten, Ph.D., on the DHS Transition to Practice program. The morning session continued with briefings from Lujo Bauer (CMU), Matt Caesar (UIUC), and Ehab Al-Shaer (UNC-Charlotte) on successes in tech…
  • SoS Musings #16 - Biometrics Growth, Concerns, and Research
    SoS Musings #16 Biometrics Growth, Concerns, and Research
  • "Fileless Malware a Growing Trend, Warns Mcafee"
    According to researchers at McAfee, there has been an increase in the growth and use of fileless malware. Fileless malware refers to a method in which system tools such as Microsoft PowerShell are used to execute attacks in order to evade detection…
  • Cyber Scene #23 - Denials and Affirmations
    Cyber Scene #23 DENIALS AND AFFIRMATIONS
  • "Increased Ransomware Activity Prompts FBI Warning"
    The FBI has released a warning pertaining to the launch of ransomware attacks in which malware is installed on a computer system to encrypt files and demand the payment of a ransom in order to decrypt the files. Systems used by government agencies,…
  • “Whoops! Has LifeLock been unlocked?”
    Massive data breaches are becoming more and more commonplace, and often companies involved in those breaches provide subscriptions to identity theft services for the victims of those breaches, such as LifeLock. Security researcher Nathan Reese came…