News
  • SoS Musings #13 - Uncle Sam Underdog in Cyber Fight

    SoS Musings #13 Uncle Sam Underdog in Cyber Fight

  • “LinkedIn Autofill Flaw Lets Hackers Harvest Website Visitors' Personal Info'”

    A security researcher by the name of Jack Cable discovered a vulnerability contained by LinkedIn’s Autofill feature. The exploitation of this vulnerability could allow cybercriminals to collect personal information belonging to LinkedIn users. This…

  • "Researchers Find that Amazon Alexa Can be Hacked to Record Users"

    Security researchers from Checkmark have discovered that the Amazon Alexa voice assistant technology could be manipulated into recording and transcribing the verbal communications of a user. The performance of eavesdropping can be enabled through the…

  • HotSoS 2018 Summary Report

    HotSoS 2018 Summary Report

  • "Hackers Designed a 'Master Key' to Unlock Millions of Hotel Room Doors"

    Security researchers from F-Secure discovered a critical flaw in the design of VingCard’s Vision software used for electronic keys, which would allow millions of hotel rooms to be hacked. An attack developed by researchers, Tomi Tuominen and Timo…

  • "Accelerating Detection of Zero-Day Vulnerabilities"

    DARPA’s Information Innovation Office (I20) recently announced the Computers and Humans Exploring Software Security (CHESS) program. The CHESS program aims to improve upon the speed and scale at which zero-day vulnerabilities are detected and fixed. This…

  • “Orangeworm Cyber Attack Group Targets Health Sector”

    Orangeworm is a hacking group discovered by Symantec to be targeting organizations linked to the healthcare industry. According to researchers, the group has been launching a custom backdoor called Trojan.Kwampirs on medical devices and machines used by…

  • "Isolated, Air-Gapped Cypto-Wallets Hacked"

    Researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev demonstrated a way in which private keys could be siphoned from air-gapped cold wallets, which are offline cryptocurrency wallets used to store bitcoin. The demonstration performed by…

  • "'Gold Galleon' Hackers Target Shipping Industry"

    The group responsible for the launch of several extensive BEC attacks on the shipping industry has been identified by researchers from Dell SecureWorks Counter Threat Unit. The group called Gold Galleon, exploited the industry's inadequate security in…

  • "Researchers Propose Scheme to Secure Brain Implants"

    A method has been proposed by researchers from KU Leuven, Belgium, that would strengthen the security of implantable neurostimulators. According to researchers, the communications between the neurostimulator and its external device programmer lacks…

  • Cyber Scene #20 - Facebook Faceoff

    Cyber Scene #20 Facebook Faceoff

  • "The Public Has a Vital Role to Play in Preventing Future Cyber Attacks"

    An extensive hacking incident recently occured in which a signifiant number of Australian organizations were affected. The attack highlights the importance of taking on stronger approaches to defending against cyberattacks and educating the…