News
-
"How the Trump Budget Would Fund Cybersecurity"In a budget blueprint for the fiscal year of 2018, the Donald Trump administration outlines spending proposals expected to bolster the security of information systems. The budget proposes to allocate increased spending of $1.5 towards the improvement of…
-
SoS Musings #3 - Progress of Security Science on Hard ProblemsSoS Musings #3 Progress of Security Science on Hard Problems
-
Cyber Scene #10 - Cyber Insecurity: the Optic of Informed Outreach PragmatistsCyber Scene #10 Cyber Insecurity: the Optic of Informed Outreach Pragmatists
-
"Google's Fuzz Tester IDs Hundreds of Potential Open Source Security Flaws"Google has found hundreds of potential security vulnerabilities through its fuzz testing tool called OSS-Fuzz. This goal of this tool is to improve the security and strength of open source software. This article defines fuzz testing and discusses the…
-
"UK reportedly set to enforce anti-encryption proposals in wake of Manchester attack"Following the devastating terror attack in Manchester that took the lives of 22 people during a concert, British politicians are allegedly pursuing to enact anti-encryption orders upon technology firms within the UK. As technology firms currently apply…
-
"Russian Researchers Claim First Quantum-Safe Blockchain"The Russian Quantum center has announced its development of the first quantum-safe blockchain, which will be used to combat the risk of quantum cryptography. This new development is set to secure cryptocurrencies, confidential government communications,…
-
"HHS Ramps Up Cyber Threat Information Sharing"Warnings delivered by the Department of Health and Human Services pertaining to the launchings of the WannaCry ransomware in addition to daily conference calls with healthcare sector stakeholders following the attacks, indicate the growing improvement of…
-
"Credential-Stuffing Threat Intensifies Amid Password Reuse"The reuse of passwords by employees pose a bigger security threat than expected as hackers are increasingly performing acts of credential-stuffing. The act of credential-stuffing includes the use of automated systems to perform brute-force logins into a…
-
"Using Bitcoin to prevent identity theft"Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory are presenting a new system that they have developed to use Bitcoin security mechanisms to shield against acts of online identity theft. This article further discusses the…
-
"Check Point Discovers Media Subtitle Vulnerability Impacting Millions"According to Check Point security researchers, attackers can exploit vulnerabilities within media player subtitles to perform malicious activity, which could pose serious threats to the security of millions of users. Media players that have been …
-
“SCADA systems plagued by insecure development and slow patching”In a new report released by Trend Micro, researchers share details of their examination and discovery of vulnerabilities affecting Human Machine Interfaces of SCADA systems. As various segments of the critical infrastructure rely on SCADA systems to…