News
-
"Keeping Big Data safe"The Unlinkable Data Challenge has been announced by the National Institute of Standards and Technology (NIST). The challenge invites participants to develop methods to de-identify the data used by the public safety community in order to protect the…
-
"Cryptojacking Spreads Across the Web"As cryptocurrencies become more popular, the performance of cryptojacking rises. Cryptojacking is known as the unauthorized mining of cryptocurrency. This article continues to discuss the concept of cryptocurrency mining, valid purposes for performing…
-
New Science of Security and Privacy Annual Report ReleasedThe annual report detailing the 2017 accomplishments of the Science of Security and Privacy Initatitive has been released. The report includes advances SoS has made in fundemental research, promoting rigorous research methods and in growing the SoS…
-
New NSA-funded "Lablets" to Advance the Science of Security and PrivacyThe National Security Agency has selected 6 Institutions to host Science of Security and Privacy Lablets. These six Lablets will be tasked for the next 5 years to discover fundamental principles in cybersecurity and privacy. The 6 Institutions are:
-
NSA Lablet at Vanderbilt to make sure America keeps moving after hacksThe National Security Agency is giving a Vanderbilt University team and their collaborators five years and several million dollars to figure out how to make cyber and Internet of Things safer. Vanderbilt is getting what’s called a Science of Security…
-
"Toshiba Has a Plan to Extend Quantum Security to Record-Breaking Distances"Toshiba has devised a new method in which secure encrypted messages are transmitted through the use of quantum mechanics. The method is expected to use fiber optic cables to send quantum keys between the sender and recipient up to 550 kilometers apart.…
-
"Tech Giants Urge Governor to Veto Georgia Cybercrime Bill"Google and Microsoft have joined cybersecurity experts in the push against Georgia Senate Bill 315. The cybercrime bill aims to criminalize unauthorized access to a computer or computer network, which would significantly impede upon actual efforts to…
-
"Intel Facing New Spectre-Like Security Flaws"A German computing magazine by the name of c’t, alleges that there may be eight new Spectre-level vulnerabilities contained by Intel processors. Four of these vulnerabilities are considered to be high-risk, while the other four are classified as medium-…
-
"How to Prevent SQL Injection Attacks"SQL injection remains a highly effective hacking technique today. Hackers apply this technique on databases used on the backend of websites or web applications to perform malicious activities such as modify content, capture sensitive information, and…
-
"Medical Devices Vulnerable To KRACK Wi-Fi Attacks"Medical devices manufactured by Becton, Dickinson and Company have been found to contain a set of Wi-Fi security bugs called KRACK attacks. The exploitation of these flaws could allow hackers to eavesdrop on hospital wireless networks and gain control…
-
"Attack-Simulation Tool Protects Financial Services"The financial services industry continues to be one of the most targeted sectors by cyberattacks as cybercriminals are often seeking financial gain. The European Central Bank (ECB) has designed a new cyberattack simulation tool that will be used by…