News
-
"Could Deliberately Adding Security Bugs Make Software More Secure?"A new study published by researchers at New York University challenges the defense strategy in which flaws in software are eliminated before attackers find them. The researchers argue that a better defensive technique against the exploitation of software…
-
"The DNC Enlists Kids in Its Fight Against Hackers"The Democratic National Committee (DNC) has cosponsored a hacking competition aimed at strengthening the security of US election systems against hackers, which will be hosted by Def Con. The competition welcomes children from ages 8 to 16 to hack…
-
"Top 10 List of Dark Web Activities That Indicate a Breach"Research analysts at Terbium Labs have listed ten activities that are performed on the dark web, which suggest that a data breach or other cyber incident has occurred. These activities include the dumping of databases, leaking of source code, and more.…
-
"5 Ways to Improve Collaboration Among Security Professionals"It is important to strengthen collaboration between security practitioners in order to increase the sharing of cyber threat intelligence. The enhancement of information-sharing among security professionals would help in the advancement of security…
-
"Hacker Honeypot Shows Even Amateurs Are Going After ICS Systems"A honeypot experiment conducted by researchers from Cybereason brings attention to the targeting of industrial control systems (ICS) by less-skilled hackers. The infiltration of amateur hackers into such systems raises concerns as the mistakes made by…
-
"FBI in Smart Device Security Warning"The FBI has recently warned of the dangers posed by IoT devices when they are inadequately secured. The notice released by the FBI highlights the use of compromised IoT devices as proxies for cyber actors to preserve anonymity in the performance of…
-
"Improved Passphrases Could Make Online Experiences Both User-Friendly and Secure"Passphrases have been proven to offer a higher level of security than traditional passwords. However, human factors issues such as typos and memorability have hindered the widespread adoption of passphrases. Researchers, Kevin Juang and Joel Greenstein,…
-
"iPhone Chipmaker Races to Recover After Crippling Computer Virus"Computer systems and fab tools belonging to Taiwan Semiconductor Manufacturing Co. (TSMC), a major supplier of chips for Apple Inc.’s iPhones, were recently infected by a virus. According to TSMC, an error made in the process of software installation for…
-
“FireEye Brings Machine Learning to Endpoint Security with MalwareGuard”FireEye has announced that a machine learning based software called MalwareGuard to its FireEye Endpoint Security agent. FIreEye has armed MalwareGuard with two years of extensive training, all aimed toward detecting and mitigating cyber attacks to…
-
Summer '18 Quarterly Lablet Meeting: Chicago Dogs, Deep Dish, and talk of Tech TransferDay 1 began with a briefing from Nadia Carlsten, Ph.D., on the DHS Transition to Practice program. The morning session continued with briefings from Lujo Bauer (CMU), Matt Caesar (UIUC), and Ehab Al-Shaer (UNC-Charlotte) on successes in tech…
-
SoS Musings #16 - Biometrics Growth, Concerns, and ResearchSoS Musings #16 Biometrics Growth, Concerns, and Research
-
"Fileless Malware a Growing Trend, Warns Mcafee"According to researchers at McAfee, there has been an increase in the growth and use of fileless malware. Fileless malware refers to a method in which system tools such as Microsoft PowerShell are used to execute attacks in order to evade detection…