News
-
"Better Detection, Analysis of Malicious Attacks"Cyber 20/20, Inc. of Newark, Delaware has been chosen by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to develop technology in support of bolstering the security of financial services networks against…
-
"Fitness App Polar Flow Reveals Home Addresses of Soldiers, Spies"According to researchers, sensitive information pertaining to the lives of military personnel, intelligence agents, and other high-profile users of a fitness app called Polar Flow can be exposed through the exploitation of a feature offered by the…
-
"This Password-Stealing Malware Just Added a New Way to Infect Your PC"Smoke Loader is a constantly evolving malware downloader used to distribute threats such as Trojans, ransomware, and more. According to researchers at Cisco Talos, Smoke Loader is now using an injection method known as PROPagate, which has not been seen…
-
"As Facial Recognition Use Grows, So Do Privacy Fears"As the application of facial recognition technology continues to expand, concerns surrounding this technology grows. One of the fears associated with facial recognition is the invasion of privacy. This article continues to discuss the increasing use of…
-
"The Worst Cybersecurity Breaches of 2018 So Far"Wired has highlighted the biggest cybersecurity breaches that have occurred so far in 2018. Notable security incidents include those which have impacted critical infrastructure, universities, and more. This article continues to discuss the worst…
-
"Quantum Random Number Generator Set to Transform Internet Security"The security of the internet is expected to be significantly enhanced through the application of a true quantum random number generator (QRNG) that has been developed by Quantum Base and Lancaster University. According to Lancaster University, QRNG will…
-
Articles on ML, AI, and Decision Support Security & VulnerabilitiesThe following articles discuss machine learning (ML), artificial intelligence (AI), and decision support vulnerabilities.
-
"Is Your Smartphone Spying on You?"Researchers at Northeastern University have discovered a way in which smartphones are spying on users. According to researchers, a significant number of popular apps have the ability to secretly take screenshots and videos of a user’s screen, as well as…
-
"Attackers Targeting World Cup Fans with 'Golden Cup' Android App Loaded with Spyware"A spyware campaign has been discovered by researchers at ClearSky to be targeting 2018 FIFA World Cup fans who own Android devices. The spyware is delivered via a malicious Android application called Golden Cup, which provides live scores and more. This…
-
Pub Crawl #18Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"DHS Touts Tech It Funded to Block Mobile Phishing"DHS has announced the availability of a product developed by mobile security company, Lookout, to enhance the security of mobile devices against phishing attacks. The DHS-funded product, Lookout Mobile Endpoint Security, is expected to significantly…
-
"Thermanator Attack Steals Passwords by Reading Thermal Residue on Keyboards"A team of scientists at the University of California, Irvine, recently shared research in which they reveal the possible use of thermal residue on keyboard keys to determine the password that has been typed in by a user. The attack dubbed Thermanator…