News
-
"Most Top Travel Websites Fail to Protect User Security"A study conducted by Dashlane reveals that the majority of top travel sites fail to apply adequate security practices to protect user accounts from hackers. According to the findings of the study, most of the travel-related sites examined do not provide…
-
"Why Fileless Malware Will Continue Its Rapid Expansion"The prevalence and evolution of fileless malware continues to grow. Since fileless malware attacks do not require the downloading of executable files to infiltrate systems, they are difficult to detect and analyze. This article continues to discuss the…
-
“A Remote Hack Hijacks Android Phones Via Electric Leaks in Their Memory”A new form of the Rowhammer attack has been detailed by researchers in the VUSec research group at Vrije Universiteit in Amsterdam. In addition to causing an electromagnetic leakage in memory and triggering bit flips, the attack called GLitch also…
-
Adam's RSA Trip ReportThis year, I had a great opportunity. I got to travel to the RSA Conference and be both an attendee and also help represent Science of Security and Privacy at the agency’s booth. I tried to update the VO each day of the conference, but I found I didn’t…
-
"Millions of Fibre Broadband Routers Open to Remote Control by Hackers"Security researchers at VPN Mentor have discovered critical flaws contained by fiber-optic routers. The vulnerabilities could allow hackers to evade authentication and take control over the devices. This article continues to discuss the vulnerabilities…
-
"Flaws in Critical-Infrastructure Software Could Have Meant Catastrophe"Security researchers from Tenable discovered vulnerabilities in two widely used critical-infrastructure software programs made by Schneider Electric. The software programs are commonly used at manufacturing sites, solar power facilities, power plants,…
-
"This Malware Checks Your System Temperature to Sidestep Sandboxing"GravityRAT is a Trojan that is able to circumvent research efforts through the performance of thermal readings. The Trojan checks the temperature of systems in order to detect the operation of virtual machines (VM) used for sandboxing. This article…
-
"Car Hackers Find Remotely Exploitable Vulnerabilities in Volkswagen and Audi Vehicles"Multiple vulnerabilities have been discovered in Volkswagen and Audi vehicles. According to security researchers from Computest, the exploitation of these vulnerabilities could allow hackers to listen in on drivers and perform real-time car tracking…
-
"How Hackers Could Cause Chaos on America's Roads and Railways"The Colorado Department of Transportation faced ransomware attacks earlier this year, which had a significant impact on the agency's operations. These cyberattacks highlight the importance of strengthening cybersecurity protections for transportation…
-
"Cybersecurity Teams That Don't Interact Much Perform Best"A recent study conducted by Army scientists indicates that successful high-performing cybersecurity teams have fewer interactions among team members. The observation was made from the study of how cyber defense teams coordinated and performed in…
-
"Emerging Memory Devices Used to Develop Electronic Circuits for Cybersecurity Applications"Dmitri Strukov, a computer science professor at UC Santa Barbara, and his team are working to strengthen the security of IoT devices through the implementation of a chip that utilizes ionic memristor technology. The use of this technology prevents the…