News
-
"Hackers can hijack your connected hoverboard"Researchers at IOActive have discovered that a hoverboard manufactured by Segway is susceptible to being hacked via its Bluetooth connection, further indicating the vulnerability of online-connected objects to cyberattacks. The hoverboard called the “…
-
"AI technologies will be in almost every new software product by 2020"According to Gartner, AI technologies are expected to be widely implemented into nearly all new software products and services by 2020. As the hype surrounding AI continues to grow, software vendors are increasingly becoming more interested in offering…
-
"The dark web goes corporate"Although the “dark web” continues to provide the grounds for a marketplace of illicit services and tools, the ways in which business is conducted within this network has changed. Due to the expansion of the dark web, criminals operating within it are now…
-
"IBM Z mainframe brings end-to-end encryption to all your data"Recent incidents of massive data breaches call for comprehensive use of data encryption. IBM has unveiled IBM Z, a mainframe computer that will perform extensive encryption within an enterprise as it aims to constantly encrypt all data connected to any…
-
"Researchers Create Framework to Evaluate Endpoint Security Products"Researchers, Lidia Giuliano and Mike Spaulding, have developed a framework that could be used to assess the effectiveness of endpoint security tools. This framework was developed to assist organizations in the process of selecting and examining endpoint…
-
"Blame Human Error for WWE and Verizon’s Massive Data Exposure"Recent incidents of data exposure due to improperly configured databases and cloud repositories highlight the dangers of misconfiguration brought upon by human error. Even though mistakes made by companies may be small, they could still have massive…
-
DHS S&T Cyber Division Funding ResearchNew story out on Federal News Radio talks about the work that the Department of Homeland Security is doing in funding and transition cybersecurity research. I found some interesting tidbits.
-
"What is GhostCtrl? Android malware 'possesses' devices to spy, steal and do its bidding"Android malware by the name of “GhostCtrl”, which is a variant of Omni RAT malware, has been launched to target Android, Mac, Windows, and Linux systems in order to snoop on victims’ activity and steal sensitive data such as SMS records, contacts, phone…
-
"Experts Recover AES256 Encryption Key From a PC's Electromagnetic Emissions"With the use of an inexpensively self-built device, researchers from Fox-T and Riscure were able to recover encryption keys from the electromagnetic waves emitted by a computer in close distance. The device built by researchers performs a notable side-…
-
"Nasty Bug Left Thousands of Internet of Things Devices Open to Hackers"Security researchers have discovered a new bug, which has been dubbed, “Devil’s Ivy”. This bug was discovered within an open source software library by the name of gSOAP during the examination of an IoT camera manufactured by Axis. Canon, Cisco,…
-
NSA.gov Highlights Winners of of NSA Awards at ISEFThe National Security Agency recognized 10 students who received recognition with an article posted to NSA.gov. While the winners are not new for the avid SoS-VO reader, this posting hopefully increases awareness of the contributions to the greater…
-
"Researchers prove the security of the Vector Stream Cipher"Researchers from Kyoto University have demonstrated Vector Stream Cipher’s (VSC) strength as revealed in a sequence of papers that have been published in IEEE Transactions on Information Forensics and Security and IEICE Nonlinear Theory and Its…