News
  • "Researchers Warn of New Hyper-Threading-Based Intel CPU Vulnerability"

    Another major flaw has been discovered to be contained by Intel processors. The critical flaw dubbed TLBleed can be exploited by attackers via the Hyper-Threading technology of Intel CPUs. According to researchers, the exploitation of this flaw can allow…

  • "Five Ways GDPR Could Limit Security Research"

    EU's General Data Protection Regulation (GDPR) is expected to significantly impact the ways in which security research is conducted. The tools used by researchers to track malicious actors have already been impacted by the new privacy rules. This article…

  • "Hotels, Airlines and Travel Sites Battle Bot Attacks"

    Research conducted by Akamai reveals that sites of organizations within the hospitality and travel industry are being largely targeted by botnet attacks, which attempt to breach accounts. A significant number of these attacks have also been…

  • "City-Crippling Ransomware, Crypto Hijackings, and More: 2018 Mid-Year Cybersecurity Update"

    Martin Giles of MIT Technology Review revisits the predictions made earlier this year in regards to the biggest cyberthreats that would be faced in 2018 and gives an update on those threats. The predictions surrounding the increase of data breaches,…

  • "WPA3: Next Generation of Wi-Fi Security Now Available"

    WPA3 has officially been launched by the Wi-Fi Alliance. The latest Wi-Fi security standard provides stronger protections for personal and enterprise networks. WPA3-Personal and WPA3-Enterprise are two modes of operation that will be supported by the…

  • "Cracking Cortana: The Dangers of Flawed Voice Assistants"

    Security researchers will demonstrate security vulnerabilities contained by Microsoft’s Windows 10 voice assistant, Cortana, that could allow attackers to perform a number of malicious activities such as take over a locked device, view…

  • "Security Pros Expect Rise in Nation-State Attacks"

    Nation-state attacks are expected to rise significantly as a result of increasing geopolitical conflicts. The results of a survey conducted by Tripwire to which 416 security professionals responded, reveal that there is much anticipation for the…

  • "How to Prioritize Security Vulnerabilities in SecDevOps"

    Prioritizing security vulnerabilities would improve upon the process of SecDevOps. The identification of effective vulnerable functionalities contained by open source components is important in the prioritization of security vulnerability remediations.…

  • National Security Agency renews Science of Security Lablet at NC State

    North Carolina State University annouces renewed Science of Security Lablet to continue its work in developing the cybersecurity and privacy breakthroughs needed to safe guard cyberspace. https://www.engr.ncsu.edu/news/2018/06/08/nsa-renews-lablet/

  • Vanderbilt Lablet - Cyber-physical systems security summer camps are games and fun for young learners

    The Vanderbilt Lablet as recently hosted two summer camp sessions for middle and high school students on the security of cyber-physical systems.  The university has recently published a news story on the camp. https://engineering.vanderbilt.edu/…

  • "The Year in Cybersecurity: The Story So Far"

    The cybersecurity industry continues to alter its approach to addressing cyber challenges as the cyberattack surface grows. Current cybersecurity trends in relation to cyberattacks, technology, and more, indicate new and ongoing cyber challenges and…

  • Cyber Scene #22 - All Cybersecurity Politics Are ...

    Cyber Scene #22 All Cybersecurity Politics Are: Local