"AutoCanada Hit by Cyberattack"

"AutoCanada Hit by Cyberattack"

AutoCanada, a major Canadian car dealership, recently announced that it was affected by a cyberattack that may result in some disruptions.  The incident was discovered on August 11 and impacted some internal IT systems.  The company noted that the investigation is ongoing and that the full scope, nature, impact of the incident, and whether customer, supplier, or employee data has been accessed is still unknown.  AutoCanada operates 70 dealerships in Canada and 18 in Illinois, in the United States, selling tens of thousands of new and used vehicles every year.

Submitted by Adam Ekwall on

Vanderbilt Researchers Secure $2M ARPA-H Contract to Enhance Medical Device Security

Vanderbilt Researchers Secure $2M ARPA-H Contract to Enhance Medical Device Security

Kevin Leach, a Science of Security Virtual Institute Principal Investigator, and James Weimer, both researchers from Vanderbilt University, have been awarded a $2 million contract from the Advanced Research Projects Agency for Health (ARPA-H). Their project, “BALAM-D: Binary Analysis Lodestar for Assuring Medical Devices,” focuses on improving software security in medical devices like insulin pumps and pacemakers.

Submitted by Katie Dey on

New ASU Institute to Drive Cybersecurity Education and Workforce Development

New ASU Institute to Drive Cybersecurity Education and Workforce Development

Arizona State University’s Center for Cybersecurity and Trusted Foundations (CTF), led by NSA Science of Security Virtual Institute Principal Investigator Yan Shoshitaishvili, has been awarded a $4.5 million DARPA grant to establish the American Cybersecurity Education (ACE) Institute. The institute will create a national hub for cybersecurity education, including a master’s program focused on AI applications for security. Inspired by the idea that “it takes a great thief to catch one,” the program will teach students to think like cybercriminals to better defend critical infrastructure.

Submitted by Katie Dey on

"New Chatbot Can Spot Cyberattacks Before They Start"

"New Chatbot Can Spot Cyberattacks Before They Start"

Researchers at Georgia Tech's Scheller College of Business, in collaboration with colleagues at the University of the District of Columbia, developed a chatbot to conduct sentiment analysis on popular social media sites such as X (formerly known as Twitter), with the goal of identifying cyber threats. Sentiment analysis was performed on human responses to the chatbot's tweets, gauging users' feelings, attitudes, and moods.

Submitted by Gregory Rigby on

New Resource Available: Cybersecurity in Context

New Resource Available: Cybersecurity in Context

We are pleased to share the release of Cybersecurity in Context, a comprehensive introduction to the essential themes shaping the field of cybersecurity. Authored by Chris J. Hoofnagle and Golden G. Richard III, this resource is designed for students and professionals seeking a solid foundation in the technology and policy that influence cybersecurity today.

Submitted by Katie Dey on

"NIST Releases First 3 Finalized Post-Quantum Encryption Standards"

"NIST Releases First 3 Finalized Post-Quantum Encryption Standards"

The National Institute of Standards and Technology (NIST) has finalized its principal encryption algorithms that can withstand the cyberattack of a quantum computer. Researchers worldwide are racing to develop quantum computers that could break the encryption used today to provide security and privacy for nearly all online activities. The announced algorithms are specified in the first completed standards from NIST's post-quantum cryptography standardization project, and are ready for use.

Submitted by Gregory Rigby on

"Watch How a Hacker's Infrared Laser Can Spy on Your Laptop's Keystrokes"

"Watch How a Hacker's Infrared Laser Can Spy on Your Laptop's Keystrokes"

Samy Kamkar, a renowned hacker, has his own version of a laser microphone. He can point an invisible laser at a distant laptop through a window and detect its vibrations to reconstruct almost every character typed on it. The method, which uses the subtle acoustics created by tapping different keys on a computer, works even without a keyboard view if the hacker has a line-of-sight view of a relatively reflective part of the target laptop. This article continues to discuss Kamkar's keystroke eavesdropping technique.

Submitted by Gregory Rigby on

"Ecovacs Home Robots Can Be Hacked to Spy on Their Owners, Researchers Say"

"Ecovacs Home Robots Can Be Hacked to Spy on Their Owners, Researchers Say"

Security researchers Dennis Giese and "Braelynn" found that hackers can take control of Ecovacs vacuum and lawn mower robots to spy on owners using the devices' cameras and microphones. After analyzing several Ecovacs products, the researchers found several vulnerabilities that could be exploited to hack the robots via Bluetooth and remotely turn on microphones and cameras. The main issue is a vulnerability that enables anyone with a phone to connect to and hijack an Ecovacs robot via Bluetooth from as far away as 450 feet.

Submitted by Gregory Rigby on

"Can Online Voting Be Secure? Experts in Las Vegas Try to Hack New Platform"

"Can Online Voting Be Secure? Experts in Las Vegas Try to Hack New Platform"

Cybersecurity professionals are testing their skills against a new online voting platform called Secure Internet Voting (SIV) to explore potential security vulnerabilities in the next generation of election systems. It allows people to vote using their phones or computers and is already being used in small pilot programs across the US. However, it faces significant barriers to wider adoption as most states prohibit widespread use of online voting due to security concerns, preferring auditable paper ballots. This article continues to discuss SIV and hackers' exploration of it.

Submitted by Gregory Rigby on
Subscribe to