News
-
"Infosec white-coats: Robots are riddled with software security bugs"IOActive researchers point out the many cybersecurity flaws within multiple home, business, and industrial robots that could easily be exploited by hackers. These vulnerabilities were discovered after in-depth security tests and evaluations of mobile…
-
"This malware tracks your audio by remotely controlling PC microphones"CyberX’s research team has discovered new malware that can remotely control PC microphones, allowing hackers to listen in on conversations. Hackers that are launching this new malware are also storing infiltrated data such as screenshots, documents, and…
-
"How The Media Are Using Encryption Tools To Collect Anonymous Tips"News organizations such as the Washington Post, NY Times, and ProPublica are taking advantage of end-to-end encryption technology by welcoming the public to send them anonymous tips through several encrypted messaging applications and services. This…
-
"How DHS hopes to harden tech against GPS spoofing"The Department of Homeland Security is conducting tests to improve the security of GPS signals as devices and government operations such as smartphones and the military rely on the critical services provided by these signals. DHS Science and Technology…
-
"New Version of Dridex Banking Trojan Uses ‘AtomBombing’ To Infect Systems"A new version of the Dridex banking Trojan has been discovered and this time it is being injected through a newly developed technique called AtomBombing. This new code injection technique has already been performed to attack multiple online banking…
-
NSA Talks about Science of SecurityThe National Security Agency posted an article on NSA.gov that calls for nominations for the 5th annual paper competition and highlights some of the SoS accomplishments of the past year. Highlights include an accomplishment from each of the lablets, the…
-
“Researchers from Google, CTI Break SHA-1 Hash Encryption Function”Security researchers at Google and the CWI Institute have revealed that the Secure Hash Algorithm-1 (SHA-1) cryptographic function is still susceptible to being cracked by hackers. Researchers were able to mathematically generate identical SHA-1 hashes…
-
"Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED"Researchers at Ben-Gurion’s cybersecurity lab have discovered ways in which drones can steal data by scanning a computer’s LED indicator light. This hacking technique manages to bypass “air gap”, a security method designed to separate computers from the…
-
"Cloudflare 'Cloudbleed' Flaw Leaks User Data from Millions of Websites"Security researchers at Google have discovered a new malicious Cloudflare bug, Cloudbleed, which is responsible for leaking sensitive information of millions of people. This sensitive information includes private messages, passwords to online profiles…
-
"Cybersecurity of the power grid: A growing challenge"The U.S. electricity grid faces new challenges as cyberattacks become increasingly dangerous threats than ever before. In addition to protecting the grid against physical disasters, innovations and strategies for combating cyberattacks must also be…
-
"Amazon partners with state for new cybersecurity education pipeline"Amazon has partnered up with Virginia to improve cybersecurity education. Governor Terry McAuliffe has announced a new partnership between Amazon Web Services and the Virginia Cyber Range, which will help to maintain cloud infrastructure and build upon…
-
"Hackers can steal millions of cars after discovering huge flaw in manufacturer's connected car apps"Security researchers at Kaspersky Lab have discovered vulnerabilities in multiple car Android applications that would allow hackers to trace cars and unlock doors. These apps are revealed to have poor encryption and handling of sensitive information such…