News
-
"Don’t Worry About ‘Cyber Pearl Harbor,’ But Hackers Are Already Targeting Our Critical Infrastructure"Over the years, government officials have warned of a “Cyber Pearl Harbor” in which a cyberattack inflicts damage on critical infrastructure such as the power grid, nuclear power plant, or reservoir. Cybersecurity experts claim we should not be too…
-
"The Next Destination for Your Security Operations Is the Cloud"Cloud technology is increasingly being utilized to support security applications. Research from Schneider Electric reveals that about 42 percent of surveyed IT and security managers are currently running security applications in the cloud and almost half…
-
"Future of the SIEM"As the mobile, cloud, and IoT industries continue to expand in technological innovations and needs become more complex, security information and event management will also need to be restored to fit these changes. The role of SIEM is to log security…
-
"'Swearing Trojan' Tactics Could Become Global Threat: Researchers"A threat called the “Swearing Trojan”, originally targeted at users in China, has recently been discovered by researchers at Tencent Security. This threat is able to steal sensitive personal information from Android devices such as bank credentials by…
-
"Kirk ransomware – A Star Trek Themed Ransomware that requests Monero payments"An Avast malware researcher has discovered another new ransomware that collects Monero payments and takes the theme of Star Trek. This new ransomware can encrypt 625 different file types. The Star Trek theme is expanded upon as the extension to the…
-
Pew Research Study on What the Public Knows about CybersecurityPew has released results from their survey on what the public knows about cybersecurity. As you can probably guess, the results were not stellar. (I took the survey, and got 10 out of 10 correct, putting me at the 1% threshold). The findings…
-
"Intelligence-Driven Supply Chain Resilience"As system environments and attacks become increasingly more sophisticated, security tactics must place more emphasis on detection and response, rather than the sole implementation of tools to prevent attackers from intrusion. This article discusses ways…
-
"New brain-inspired cybersecurity system detects 'bad apples' 100 times faster"Sandia Lab has collaborated with Lewis Rhodes Labs to develop a cybersecurity system that scans for very specific patterns instead of general indicators of an attack. The system in development is inspired by the complexity of the brain as the scanning…
-
"Security for multirobot systems"Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory have discovered a new method to protecting communication networks of multirobots. Areas of research are beginning to expand further from communication, control algorithms, and…
-
Farmers Hacking TractorsIn a previous SoS meeting we learned there is challenge of securing tractors. A recent article published goes into much more detail about how American farmers are buying and installing Ukrainian Firmware for their John Deere tractors. URL: https…
-
Predatory Journals Recruite Fake EditorA research study published in Nature talks about the issue of predatory journals. These journals generally only try to make money from the academic community rather than giving good peer reviwed publications. The researchers created a fake person, Anna…
-
SoS Musings #1 - We are winning the battles but the war is elusive!SoS Musings #1 We are winning the battles but the war is elusive!