News
-
Synopses of Presentations: Quarterly Lablet meeting NCSU 1-2 Feb 2017The winter 2016 quarterly Science of Security (SoS) Lablet meeting was held at North Carolina State University on February 1 and 2, 2017. In addition to speakers from the Lablets and NSA, corporate speakers provided insights into the problems of…
-
Researchers, Industry, NSA meet, discuss Privacy, Artificial IntelligenceRaleigh, NC February 2, 2017 The winter 2016 quarterly Science of Security (SoS) Lablet meeting, sponsored by NSA, was hosted at North Carolina State University on February 1 and 2, 2017. Laurie Williams and Munindar Singh, Principle…
-
"Android Phones Still Open To WAP Attacks"Researchers at Context Information Security have discovered that Android phones are still susceptible to SMS-based attacks. Such attacks can disable functionality and invite other attacks such as ransomware. These vulnerabilities are suspected to…
-
Cards Promoting ValidityNormally, blog posts about a super bowl commerial would not rate as interesting for the Science of Security community. However; one did.
-
"Cloud Storage The New Favorite Target Of Phishing Attacks"According to recent security reports released by PhishLabs, phishing was the most common attack vector in 2016. Reports on phishing trends also reveal that cloud storage service providers such as Google and DropBox have increasingly been targeted over…
-
"HTTPS abusers hide malware in encrypted tunnels to avoid security"As utilization of encrypted navigation through HTTPS increases, cyber criminals have detected vulnerabilities to bypass detection. Investigations reveal that hackers have discovered ways to attack by exploiting the inability…
-
"Hacking printers exploiting Cross-site printing (XSP) attacks"Researchers at University Alliance Ruhr have discovered security vulnerabilities within 20 different printer models, which could be exploited by hackers to steal sensitive information and disable hardware devices. These security vulnerabilities are …
-
"Biometrics And Payments: Companies Are Using Your Fingerprints For Cybersecurity"As the number of security breaches rises, companies within the transactions industry are further exploring methods of biometrics as a means of uniquely identifying consumers based on biological characteristics, in order to strengthen the…
-
"Healthcare Hack Offers Key Lessons in Cybersecurity, Attorneys Write"Cybersecurity attorneys from the national law firm, LeClairRyan, advise companies and consumers to learn lessons from the 2015 data breach of healthcare firm, Anthem, which hacked personal data of about 80 million Americans. Attorneys emphasize the…
-
Disposable Drones?San Francisco based R&D firm, Otherlab, is being funded by DARPA in a quest to develop low cost, "disposable" drones that can deliver time-sensitive items such as food in emergency or disaster situations. Currently the drones…
-
"Is A Master Algorithm the Solution to Our Machine Learning Problems?"'One algorithm to rule them all' What if there was a "master algorithm" to tie together all of the other machine learning algorithms currently being used today? Author, Pedro Domingos, is studying the possibility. This article provides an in depth look…
-
Areas for Cybersecurity Innovation this YearAs the threat against cybersecurity grows with each new technological advance, researchers must continually find more effective and creative ways to protect digital assets and thwart malicious intruders. Fortinet has …