News
-
"FBI Warns Healthcare Entities of Threats to FTP Servers"The FBI has released statements alerting the healthcare sector of the threats and attacks being launched at file transfer protocol servers being ran in anonymous mode. These FTP servers store sensitive personal health information that could be exploited…
-
"If You Want to Stop Big Data Breaches, Start With Databases"Data breaches have increasingly become more common over the past few years due to poor security configurations of databases directly linked to the internet. Though any type of database can be susceptible to data breaches if poorly configured, “NoSQL”…
-
"Feds to battle cybersecurity with analytics"The federal government seeks to improve cybersecurity through the implementation of analytics technology. It has been emphasized that new standards and protocols must be put in place to manage the distribution of information throughout public and private…
-
"Cybersecurity Expert Studies Novel Tools to Thwart Attacks"Cybersecurity experts emphasize that cybersecurity is a continuous journey of study, exploration, and maintenance. There is no single solution to preventing cyberattacks, though security researchers and companies still try to develop the best…
-
"Repealing FCC’s privacy rules: A serious blow to privacy, cybersecurity"The House of Representatives voted to repeal privacy rules devised by the FCC on March 28. This would allow ISPs the right to invade the privacy of users by recording browsing history, app usage, and other sensitive data that would be collected to sell…
-
"Desktop scanners can be hijacked to perpetrate cyberattacks"According to a new paper released by researchers at Ben-Gurion University, desktop scanners are susceptible to being infiltrated through different light sources such as lasers and smart bulbs. Researchers performed multiple demonstrations that reveal the…
-
"Researcher Says API Flaw Exposed Symantec Certificates, Including Private Keys"A security researcher, Chris Byrne, has exposed vulnerabilities in the API utilized by Symantec that would expose Symantec certificates and private keys. Although this discovery was discovered in 2015, disclosure was dissuaded by Symantec due to the time…
-
"IoT security woes: This smart dishwasher was found connected to an unsecured web server for months"Further emphasizing the potential security vulnerabilities of IoT devices, a smart dishwasher has been revealed to be connected to an unsecured web server. Despite being notified of this security flaw by a security expert, the manufacture chose to ignore…
-
"Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’"Philip Quade, the first CISO of Fortinet, shares his knowledge of the current challenges and concerns that are being faced by the U.S. and organizations today in regards to cybersecurity. This article outlines Quade’s responses in the topics of…
-
"Data privacy and security considerations for the future of wearables"NHS is embracing new advances in technology that could help reduce financial burdens brought upon by growing budget deficits. There has been increasing support for wearable technology that would promote patient self-care and monitoring, in turn reducing…
-
Reviews & Outreach SubscriptionSubscribe to Reviews & Outreach (R&O) - designed to highlight some of the exciting research, news, and events that impact our Science of Security (SoS) community.
-
“Security awareness relies on balance of technical, human-behavior skill sets”Technical security practitioners and experts in behavior modification and community engagement must work together to reduce hazardous actions and behaviors of employees within an organization. Collaboration of these types of expertise can be done through…