News
-
"New Security Woes for Popular IoT Protocols"Researchers will provide further details on vulnerabilities contained by popular IoT protocols, Message Queuing Telemetry Transport (MQTT) and the Constrained Application Protocol (CoAP), at Black Hat Europe 2018. According to researchers, the security…
-
"Vulnerable Controllers Could Allow Attackers to Manipulate Marine Diesel Engines"Four vulnerabilities in relation to authentication and encryption have been discovered to be contained by the firmware of marine diesel engine controllers manufactured by Auto-Maskin. The exploitation of these vulnerabilities can allow attackers to…
-
"Defending Against Spectre and Meltdown Attacks"A significant advancement has been made by MIT researchers in the effort to defend against Spectre and Meltdown attacks. Researchers have developed a method, called Dynamically Allocated Way Guard (DAWG), that complicates the exploitation of…
-
"Threat Intelligence Computing for Efficient Cyber Threat Hunting"A cyber reasoning paradigm has been developed by IBM researchers for the purpose of establishing and easing the process of discovering cyber threats. The paradigm, called threat intelligence computing (TIC), improves upon the observation of cyber facts,…
-
Learn and Teach Robot HackingCyber-Physical Systems (CPS) Cybersecurity Curriculum Free curriculum with supporting technologies to introduce students to the exciting field of cybersecurity. Enable K-12 educators and students to understand the methods of hacking and defensive…
-
"Army Researcher Minimizes the Impact of Cyber-Attacks in Cloud Computing"An algorithm has been developed by a team of researchers to reduce the effects of potential cybersecurity attacks within the cloud computing environment. The algorithm addresses cybersecurity concerns surrounding the hypervisor in cloud computing. This…
-
"SEC Warns Corporate Cyber Weakness Could Violate Federal Law"The U.S. Securities and Exchange Commission (SEC) has issued a warning pertaining to the potential violation of federal law by companies that do not implement sufficient cybersecurity controls. The warning highlights the duty of all public companies to…
-
"Study Exposes Security Vulnerabilities in Terahertz Data Links"Terahertz data links are expected to be used in future wireless networks with their inherent security improvements and ability to carry a significantly higher amount of data than microwaves used in today's wireless networks. However, findings of a study…
-
"Toward Unhackable Communication: Single Particles of Light Could Bring the 'Quantum Internet'"An advancement in quantum communication has been made by researchers at Purdue University, which increases chances of successfully transmitting large pieces of sensitive information using particles of light, called photons. This development is a…
-
"UK Launches 'World First' IoT Code of Practice"A Code of Practice (CoP) aimed at helping manufacturers strengthen the security of IoT devices was recently released by the UK government. HP Inc. and Centrica Hive Ltd are the first IoT manufactures to sign up in agreement with the code. This article…
-
"35 Million Voter Records from 19 States for Sale on Hacking Forum"Anomali Labs and Intel 471 researchers discovered over 35 million 2018 U.S. voter records from 19 states being sold on a dark web forum. The voter registration data records reveal full names, phone numbers, physical addresses, and more. This article…
-
"Scaling the IoT Product Security Lifecycle with Automation"Recent security incidents involving IoT devices call for the use of a different approach to securing such devices. Automation is a recommended method for improving upon the IoT security process. This article continues to discuss the issues…