News
  • "Scientists Hack a Computer Using DNA"
    Scientists at the University of Washington in Seattle have developed the first biological malware that is capable of successfully taking over a computer. Researchers were able to demonstrate this hack by encoding malicious software into DNA then using it…
  • "Cyber-Attack on Solar Panels Could Shut Down Power Grids via Domino Effect"
    New research by Dutch security engineer, Willem Westerhof, reveals the presence of vulnerabilities within photovoltaic panels, which could have an extensive impact on a country’s power grids. Westerhof claims that the vulnerabilities of photovoltaic…
  • "How a port misconfiguration exposed critical infrastructure data"
    UpGaurd researchers have discovered an open port in which hackers could use to exfiltrate data from the servers of Power Quality Engineering (PQE), a Texas-based firm. The discovery was made as Chris Vickery, UpGaurd Director of Cyber Risk Research, was…
  • "REnigma malware reverse-engineering tool commercialized"
    DHS S&T has announced the transition of an innovative malware analysis tool by the name of “REnigma”, into the marketplace as a new startup technology company.  The transition of this technology into a commercially available product is supported…
  • "Researchers Add Profile-Based Anomaly Detection to SIEM"
    Researchers at Germany’s Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) have added profile-based anomaly detection software for security information and event management (SIEM) systems to help in the management of…
  • "NIST Releases Cybersecurity Definitions for the Workforce"
    The National Institute of Standards and Technology (NIST) has released a finalized draft version of its National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. The objective of this framework is to improve upon the…
  • "Sorry ‘cyberwarrior’, your password is pwned along with 320m others"
    Troy Hunt, a security researcher, has developed a new tool to help people discover if their current or older passwords have been compromised in data breaches. This tool by the name of “Pwned Passwords” is website that allows users to enter a…
  • "AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses"
    Researchers at Endgame security firm have demonstrated the use of artificial intelligence to modify malware code in order to circumvent anti-malware machine learning within antivirus software. The experiment performed by researchers brings attention to…
  • "Inside the fight against malware attacks"
    Protecting systems against malware is an ongoing battle for security researchers as malware authors continue to improve upon the methods of which their malware attacks defeat anti-malware software. As malware authors encrypt their malware programs, the…
  • Change p-value of significance to .005?
    An article that is drawing attention is one that is published by lots of people from many departments. Its trying to improve significant scientific research. The main proposal is that we start treating .005 as significant instead of .05. Read More:…
  • "More Hackers Building SSL Encryption into Malware, Zscaler Finds"
    According to Zscaler, a cloud security company, there has been a significant increase in the use of Secure Sockets Layer (SSL) encryption by malware authors and operators for the circumvention of detection and concealment of communication in malware…
  • Science Successes or Fails? -> Tell Dr. Frincke (NSA Research Director)
    The National Security Agency Research Director posted on her LinkedIn Profile about the successes and failures of Science. She is requested the community to email first hand examples to research_partners at nsa dot gov. This is a great chance for the SoS…