News
-
"Macs Infected With New Monero-Mining Malware"New malware by the name of mshelper has been discovered to be hijacking Apple Macs to mine for Monero cryptocurrency. The cryptomining malware makes use of XMRig, which is a legitimate mining tool. This article continues to discuss the mshelper malware…
-
KU team wins NSA funding to improve security for Internet of Things with ‘big-thinking’ researchKansas University announced the creation of a SoS Lablet at Kansas. More information see the KU announcement. http://news.ku.edu/2018/05/15/ku-team-wins-funding-nsa-improve-security-internet-things-big-thinking-research
-
"7 Tips for Building an API-Secure Architecture"Inadequately protected application programming interfaces (APIs) pose a risk to the security of public sector agencies in which this tool is commonly used for interconnection. Agencies are encouraged to implement API gateways to strengthen the security…
-
"BMW Racing to Patch 14 Security Vulnerabilities Found in Its Cars"The on-board computers of several BMW vehicles have been discovered to contain 14 security vulnerabilities. According to researchers from the Chinese firm, Tencent Keen Security Lab, these vulnerabilities are contained by different components of the…
-
"Study of Android Users: Mobile Security Messages 20 Percent More Effective If Warnings Vary in Appearance"A study conducted by researchers from Brigham Young University reveals that people are more likely to adhere to security warnings if the messages vary in appearance. The study highlights that the frequent exposure to static security warnings causes…
-
"Creating Situational Awareness with Analytics"Using analytics can help in the development of situational awareness, which is essential to cybersecurity. Roberta “Bobbie” Stempfley, director of the CERT Division at Carnegie Mellon University's Software Engineering Institute, gave a keynote…
-
“Hackers Infected over 500,000 Routers with Potential to Cut Off Internet"A malware known to security researchers as VPNFilter has hit over 500,000 routers and other devices in 54 countries. VPNFilter can steal login and password data, monitor web activity, and shutdown the routers themselves.The article further discusses…
-
"Bank Robbing? There's a Vulnerable Web App for That"Positive Technologies recently published a report called Bank Attacks 2018. The report highlights the vulnerability of banks to attacks launched by cybercriminals due to insider threats and security flaws contained by financial web applications. This…
-
"Internet of Things: Who Is Watching You?"Pwnie Express conducted a survey to which hundreds of IT security professionals responded. The results of this survey indicate that the concerns of information security professionals surrounding the security threats posed by IoT devices have…
-
"After Meltdown and Spectre, Another Scary Chip Flaw Emerges"Following the discovery of critical processor vulnerabilities earlier this year, called Meltdown and Spectre, another major flaw has been discovered to be contained by Intel, AMD, and ARM processors. The exploitation technique of the recently disclosed…
-
"The Pentagon Has a Plan to Verify Identity via Smartphones"A project funded by the United States Department of Defense aims to implement new technology into smartphones that could verify the identity of users and assign risk scores. The technology will verify the identity of a user by analyzing attributes that…
-
"Wicked Botnet Uses Passel of Exploits to Target IoT"A new variant of the Mirai botnet by the name of Wicked has emerged. According to security researchers at Fortinet, Wicked makes use of at least three exploits to target unpatched IoT devices. This article continues to discuss the Wicked botnet in…