News
-
Pub Crawl #3Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"US-CERT Warns HTTPS Inspection May Degrade TLS Security"Research reveals that security is weakened when HTTPS inspection tools are ran in TLS traffic streams, which the Department of Homeland Security has now released a warning about. All HTTPS interception products pose potential dangers of man-in-the-middle…
-
"Machine learning can also aid the cyber enemy: NSA research head"Cyber attackers are starting to utilize machine learning technology to launch their attacks. Dr. Deborah Frincke, head of the NSA/CSS Research Directorate talks about potential scenarios in which a malicious user could manipulate the machine learning…
-
“Flaws in MAC address randomization implemented by vendors allow mobile tracking”Researchers at the U.S. Naval Academy have discovered a new attack method to manipulate the MAC address randomization system to track mobile devices. The purpose of this system is to protect the privacy of the user by broadcasting an arbitrary Wi-Fi MAC…
-
Cyber Scene #8 - Checking out, out of, and in with the U.S. Senate on Cyber SecurityCyber Scene March 17, 2017 Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaborat
-
"Researchers develop automatic security tests for complex systems"Researchers at Saarland University are developing ways to efficiently detect security vulnerabilities before they are discovered by hackers. Test data generators are used to rapidly generate test inputs for examined programs, however invalid inputs are…
-
"Hackers Can Use Sound Waves To Crack Your Smartphones, Scientists Suggest"Security researchers at University of South Carolina and University of Michigan have discovered a small security loophole in smartphones that could cause major problems. This loophole would enable a hacker to infiltrate and manipulate a device using…
-
"Ben-Gurion University researcher identifies solution to protect online videos and images from cyberattacks"There has been a noticeable increase in the use of online videos and images to launch cyberattacks. A researcher at Ben-Gurion University has discovered a way to protect online videos and images from being infiltrated by hackers through a set a of…
-
"PetrWrap, the 'Almost Flawless' Ransomware"PetrWrap is the latest ransomware that builds upon a malicious cryptographic algorithm of another ransomware called Petya. Petya was discovered in 2016 by Kaspersky Lab and revealed to encrypt stored data and overwrite the MBR of the targeted …
-
"Malicious uploads allowed hijacking of WhatsApp and Telegram accounts"The developers of popular communication service apps, WhatsApp and Telegram, have recently patched their application code after being notified by security researchers of vulnerabilities that would allow attackers to infiltrate user accounts through the…
-
"Rapid7 discloses multiple vulnerabilities in telepresence robot"Rapid7 has discovered three security vulnerabilities in the telepresence robot, which is a device that combines a camera, microphone, and iPad to allow users to remotely participate in face-to-face meetings. Three of the vulnerabilities discovered…
-
"White House Report Finds Cybersecurity Gaps at Federal Agencies"According to a White House report, there have been 30,899 hacking incidents that have targeted federal government agencies in 2016. While there has been an increased effort to develop stronger cyber defense, major advancements still need to be made in…