News
-
HotSoS 2017 - Differential Privacy, CPS, and complex navigation of security issues - Highlighted TopicsDifferential Privacy, CPS, and complex navigation of security issues at HotSoS 2017
-
"Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects Them"Security researchers, Charlie Miller and Chris Valasek, performed a demonstration two years ago that revealed the potential remote hacking of a vehicle through its internet connection to disable driving functionality. Since then, cybersecurity concerns…
-
"How criminals can steal your PIN by tracking the motion of your phone"Cyber researchers at Newcastle University have discovered that it is possible for hackers to crack PINs and passwords by using malicious websites and apps to spy on users just based on the motion of 25 different standard sensors integrated into most…
-
"Outer-Space Hacking a Top Concern for NASA’s Cybersecurity Chief"As NASA scientists continue to transmit and extract data to and from their Swift and Fermi satellites for further space examination, cybersecurity has become a greater issue. Projects have outlasted the expected life expectancy by over a decade,…
-
Science of Security 2016 Annual ReportThe Science of Security Annual Report details the progress of the activities in the Science of Security research initiative. The most recent annual report, published in April 2017, highlights the work done in Fiscal Year 2016. For more information about…
-
Science of Security 2017 Best Poster AwardThe HoTSoS Best Poster Award at the Hot Topics in Science of Security (HoTSoS) symposium recognizes cybersecurity research with scientific rigor, clarity of presentation, and global impact. It is to encourage scientists across multiple disciplines to…
-
"Urgent action needed to bolster cybersecurity for critical infrastructure"Further improvement of cybersecurity efforts to protect critical infrastructure is needed now more than ever. Through reports and recommendations, MIT experts emphasize the importance of the Trump administration taking action to develop a highly logical…
-
"Regulators Warn of Man-in-the-Middle Attack Risks"Federal regulators are alerting healthcare sector entities about how some of the end-to-end security products being utilized in their systems, could be vulnerable to man-in-the-middle attacks. This warning also applies to Secure Hypertext Transport…
-
"Hackers are attacking Word users with new Microsoft Office zero-day vulnerability"Security researchers at McAfee have recently discovered a vulnerability in Microsoft Word that could be exploited by hackers to stealthily launch different types of malware even on computers that are fully patched. All versions of Microsoft Office are…
-
"Hard-coded passwords put industrial systems at risk"Researchers from German firm OpenSource Security have revealed that SCADA has been distributing products with passwords embedded within the firmware which is also unchangeable. Hard-coding passwords into a system poses serious risks for connected…
-
"Driver privacy can be compromised in usage-based insurance systems"Researchers at Ben-Gurion University of the Negev have discovered the possibility of an attacker compromising private information about a driver including their location, home address, work address, and more via Usage-Based Insurance program’s cloud…
-
"IoT Botnet 'Amnesia' Hijacks DVRs via Unpatched Flaw"A new Linux/IoT botnet by the name of "Amnesia" has been discovered to target digital video recorders and other embedded systems manufactured by China-based TVT Digital. This botnet exploits a vulnerability in remote code execution to identify and…