"It's Time to Treat Satellites as Critical Infrastructure"

"It's Time to Treat Satellites as Critical Infrastructure"

Satellite hacking could result in massive disruptions to communications, transportation, and weather forecasts, as well as the loss of sensitive data. Last February, Russia-linked hackers launched destructive malware against the American satellite provider Viasat an hour before the invasion of Ukraine. SpaceX's Starlink satellite also encountered interference from signal jamming, thus limiting bandwidth. As demonstrated at last year's Black Hat conference, a researcher created a tool to hack into Starlink for only $25.

Submitted by Gregory Rigby on

"CMU's Synergy Lab Presents Multiple Papers on Ubiquitous Sensing at UbiComp"

"CMU's Synergy Lab Presents Multiple Papers on Ubiquitous Sensing at UbiComp"

Researchers from the Systems, Networking, and Energy Efficiency (Synergy) Lab at Carnegie Mellon University (CMU) are presenting several multi-year studies on their work regarding ubiquitous sensing at the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). The Synergy Lab, led by School of Computer Science Associate Professor Yuvraj Agarwal, focuses on developing more energy-efficient computing in buildings, improving the security and privacy of Internet of Things (IoT) devices, and advancing mobile systems.

Submitted by Gregory Rigby on

"Air Europa Data Breach: Customers Warned to Cancel Credit Cards"

"Air Europa Data Breach: Customers Warned to Cancel Credit Cards"

Spanish airline Air Europa, the country's third-largest airline and a member of the SkyTeam alliance, recently warned customers to cancel their credit cards after attackers accessed their card information in a recent data breach.  The credit card details exposed in the breach include card numbers, expiration dates, and the 3-digit CVV (Card Verification Value) code on the back of the payment cards.

Submitted by Adam Ekwall on

"NSA and US Agencies Issue Best Practices for Open-Source Software in Operational Technology Environments"

"NSA and US Agencies Issue Best Practices for Open-Source Software in Operational Technology Environments"

The National Security Agency (NSA) and US federal partners have released cybersecurity guidance to promote understanding Open-Source Software (OSS) implementation and to provide best practices for securing Operational Technology (OT) and Industrial Control Systems (ICS) environments.

Submitted by Gregory Rigby on

41st IEEE International Conference on Computer Design

"ICCD encompasses a wide range of topics in the research, design, and implementation of computer systems and their components. ICCD’s multi-disciplinary emphasis provides an ideal environment for developers and researchers to discuss practical and theoretical work covering systems and applications, computer architecture, verification and test, design tools and methodologies, circuit design, and technology."

Topics include, but are not limited to security.

2023 6th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2023)

"The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC.

2023 International Defense Excellence and Security Symposium (IDEaS)

"The International Defence and Security (IDEaS) Symposium is an Annual Event that brings together participants in innovation ecosystems from Defence, Industry and Academia to exchange ideas and information and to foster connections and collaborations among Military operations, Defence decision-makers, Academic researchers and Industry capability developers.

2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

"The IEEE TrustCom-2023 is a forum for presenting leading works on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks."

"IZ1H9 - Attackers Find New Ways to Zombify Your Router: D-Link, TP-Link Devices Affected"

"IZ1H9 - Attackers Find New Ways to Zombify Your Router: D-Link, TP-Link Devices Affected"

Fortinet researchers have found a large-scale attack campaign targeting routers, turning thousands into bots for Distributed Denial-of-Service (DDoS) attacks. The new variant of Mirai, a relatively old malware that targets networked Linux devices and converts them into remotely controlled bots, contained thirteen payloads. Each new payload targets D-Link devices, Netis wireless routers, Sunhillo SureLine software, Geutebruck IP cameras, Yealink Device Management, Zyxel devices, TP-Link Archer, Korenix Jetwave, and Totolink routers.

Submitted by Gregory Rigby on

"The University of Alabama in Huntsville Demonstrates Cybersecurity Software Aboard a Lockheed Martin Technology Demonstrator CubeSat"

"The University of Alabama in Huntsville Demonstrates Cybersecurity Software Aboard a Lockheed Martin Technology Demonstrator CubeSat"

The University of Alabama in Huntsville (UAH) recently announced its creation of cybersecurity software for the US Army Space and Missile Defense Command (USASMDC). The software initiated performance testing on one of Lockheed Martin's In-space Upgrade Satellite System (LM LINUSS) technology demonstrator CubeSats. The software, called Small Satellite Defender, is a small satellite-specific Intrusion Detection System (IDS). The Small Satellite Defender functions with relatively low power, monitors satellite-specific threats, and requires little bandwidth.

Submitted by Gregory Rigby on
Subscribe to