News
  • "Popular Messaging Apps: Encrypting Is Easy but Authenticating Is Hard"
    A recent study conducted by researchers at BYU reveal that users of popular messaging apps, Facebook Messenger, What’sApp, and Viber, are not fully utilizing security options made available on these apps, which leaves users vulnerable to fraud and other…
  • "'Pulse Wave' DDoS Attacks Emerge As New Threat"
    A new form of distributed denial-of-service (DDoS) attacks has been discovered by security vendor, Imperva. These DDoS attacks have been described as pulse wave attacks in which short bursts of malicious attack traffic are launched at multiple targets at…
  • "Seven Keys to Strengthen Your Cybersecurity Culture"
    In order for organizations to more effectively mitigate cybersecurity weaknesses, a culture of cybersecurity must be fostered within the workplace. Data breaches faced by companies are often the result of employee negligence, therefore further engagement…
  • SoS Musings #5 - IoT
    SoS Musings #5 IoT
  • "Researchers warn against 'hackable' robots"
    Researchers at IOActive have warned of flaws discovered within various commercially available robots, which could be exploited to allow hackers to physically harm and spy on users. Through the investigation of notable robots such as Pepper, Nao, and many…
  • "How One Energy Department Lab Uses Physics to Boost Cybersecurity"
    A new approach to cybersecurity has been designed by the Energy Department’s Oak Ridge National Laboratory (ORNL) to improve upon the speed and security of sharing and protecting encrypted data. This method uses quantum light particles (photons) rather…
  • "A Replacement Screen Could Offer Hackers A Key To Your Smartphone"
    According to a new study conducted by researchers at Ben-Gurion University, third-party smartphone replacement parts may consist of maliciously programmed chips, which could be used to hack smartphones in order to perform malicious activities and steal…
  • "Defeating cyberattacks on 3-D printers"
    3D printers are expected to become more attractive targets of cyberattacks as this technology is now being utilized to print objects and parts used in critical infrastructure. The launch of cyberattacks targeting 3D printers may significantly impact…
  • "How to improve IoT security"
    Security challenges arise as the use of Internet of Things (IoT) continues to grow. Devices connected to the internet can pose risks to the safety, security, and privacy of users. A recent meta-study titled, “The Internet of Hackable Things”, in which…
  • “NIST Advocates Use of Longer Passwords to Improve Security”
    The U.S. National Institute for Standards and Technology (NIST) has updated its guidelines in support of increasing the complexity of passwords through the creation of longer passwords. According to NIST Special Publication 800-33B titled, “Digital…
  • "Microsoft PowerPoint exploit used to bypass antivirus and spread malware"
    Researchers at Trend Micro have discovered a cyberattack in which a vulnerability is being exploited by attackers to circumvent antivirus software and distribute Trojan malware via Microsoft PowerPoint files. The vulnerability being exploited to deliver…
  • "A Deep Flaw in Your Car Lets Hackers Shut Down Safety"
    In 2015, researchers performed a demonstration in which they hijacked a moving Jeep to manipulate its driving functions such as steering, accelerating, and breaking. Ever since this discovery, the auto industry has made attempts at preventing the hacking…