News
-
Change p-value of significance to .005?An article that is drawing attention is one that is published by lots of people from many departments. Its trying to improve significant scientific research. The main proposal is that we start treating .005 as significant instead of .05. Read More:…
-
"More Hackers Building SSL Encryption into Malware, Zscaler Finds"According to Zscaler, a cloud security company, there has been a significant increase in the use of Secure Sockets Layer (SSL) encryption by malware authors and operators for the circumvention of detection and concealment of communication in malware…
-
Science Successes or Fails? -> Tell Dr. Frincke (NSA Research Director)The National Security Agency Research Director posted on her LinkedIn Profile about the successes and failures of Science. She is requested the community to email first hand examples to research_partners at nsa dot gov. This is a great chance for the SoS…
-
"Five new threats to your mobile device security"As indicated by a recent influx of mobile malware incidents in the first quarter of 2017, mobile devices are increasingly becoming targeted by more advanced cyberattacks. Though companies such as Apple and Android have placed more effort into developing…
-
"Baltimore Cyber Range and Cyberbit Open New Cybersecurity Training and Simulation Center"Baltimore Cyber Range LLC. and Cyberbit Ltd. have opened the new Baltimore Cyber Range (BCR) cybersecurity training and simulation center in Baltimore, MD. The BCR is powered by the Cyberbit Range platform and will provide hands-on training through the…
-
"New mobile banking Trojans"The latest modification of the notorious mobile banking malware family by the name of “Svpeng” – Trojan-Banker.AndroidOS.Svpeng.ae adds on new keylogger functionality that could allow cybercriminals to steal entered text by abusing accessibility services…
-
"The Justice Department wants to help you run a vulnerability disclosure program"The U.S. Department of Justice has released guidelines to help those that are interested in legally developing their own bug bounties, also known as software vulnerability disclosure programs. Organizations may use these guidelines to help them create…
-
"Most damaging threat vector for companies? Malicious insiders"A new survey conducted by SANS reveals that organizations are increasingly recognizing malicious insiders as the greatest threat to their systems. There are several factors that can lead to the performance of insider threat activities such as…
-
"Senators introduce bill to secure Internet of Things devices"A new bill that aims to address issues pertaining to the security of IoT devices has been introduced by a bipartisan group of U.S. senators. Recent attacks on IoT devices have ignited concerns about the lack of security that has been implemented for such…
-
"Researchers pwn Alexa, turning Amazon Echo into covert snooping device"A vulnerability within the popular Amazon Echo device has been discovered by researchers at MWR InfoSecurity that could be exploited to enable attackers to secretly eavesdrop on users and steal sensitive data. Researchers reveal that this vulnerability…
-
"EU's GDPR: What Will American Companies Have To Do To Comply?"Starting in the Spring of 2018, the European Union’s General Data Protection Regulation (GDPR) will be in effect. The objective of the GDPR is to strengthen the protection of data belonging to citizens within the EU. However, this regulation will have an…
-
"Applied cybersecurity research for better protection of critical national infrastructure sectors"Cyber Apex Solutions, LLC, has been awarded a five-year Other Transaction Agreement (OTA) with a maximum value of $70 million by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to aid applied research of prototype…