News
  • "Internet of Things: When Objects Threaten National Security"
    IoT devices are becoming a greater threat to national security. The increasing development and use of IoT technologies provides more entry points for attackers into global information networks. This article continues to discuss the rise of IoT devices,…
  • "Attacking Hard Disk Drives Using Ultrasonic Sounds"
    New research reveals that hard disk drives (HDDs) are susceptible to interference from ultrasonic signals. According to researchers at the University of Michigan and Zhejiang University, ultrasonic attacks on HDDs can be launched using nearby sound…
  • "Researchers Create Framework to Prevent Cyber Attacks on Connected Cars"
    A framework has been created by scientists at the University of Texas, San Antonio (UTSA) to protect Internet-connected cars from cyberattacks. The framework called the Authorization Framework for Connected Cars could also be used in the prevention of…
  • "FBI: Reboot Your Home and Small Office Routers to Counter Russian Malware"
    The FBI, DHS, and DoJ urge the reboot of small office and home office (SOHO) routers to counter the infection of malware by the name of VPNFilter, which is linked to a Russian state-sponsored hacking group. The malware has been discovered to have…
  • "Senate Defense Bill Aims to Scrub Cyber Adversaries from U.S. Military Tech"
    The Senate Defense Bill includes cyber provisions that are aimed at bolstering the cybersecurity of the U.S. For instance, companies from which the U.S. military purchases equipment and services, will be required to disclose business engagements that…
  • DHS Cybersecurity Strategy
    DHS Cybersecurity Strategy
  • "Ultrasound-Firewall for Mobile Phones"
    A mobile application that can detect and block acoustic cookies has been developed in the SoniControl project of St. Pölten University of Applied Sciences. The application is considered to be an ultrasound firewall for smartphones and tablets that can…
  • Pub Crawl #17
     
  • Cyber Scene #21 - Facebook Follow up and Fall Out
    Cyber Scene #21 Facebook Follow up and Fall Out
  • "Macs Infected With New Monero-Mining Malware"
    New malware by the name of mshelper has been discovered to be hijacking Apple Macs to mine for Monero cryptocurrency. The cryptomining malware makes use of XMRig, which is a legitimate mining tool. This article continues to discuss the mshelper malware…
  • KU team wins NSA funding to improve security for Internet of Things with ‘big-thinking’ research
    Kansas University announced the creation of a SoS Lablet at Kansas. More information see the KU announcement. http://news.ku.edu/2018/05/15/ku-team-wins-funding-nsa-improve-security-internet-things-big-thinking-research  
  • "7 Tips for Building an API-Secure Architecture"
    Inadequately protected application programming interfaces (APIs) pose a risk to the security of public sector agencies in which this tool is commonly used for interconnection. Agencies are encouraged to implement API gateways to strengthen the security…