News
-
"Easy Decryption Shows That Chat-App Designers Should Improve the Ways They Protect Users' Personal Data"A*STAR researchers were able to recover decryption keys for popular instant-messaging applications WeChat and WhatsAPP, which could allow users' personal data and information to be collected. A mobile forensics method called information flow analysis was…
-
"'Jackpotting' ATM Hack Comes to the United States"Jackpotting attacks are now being launched within the United States to pilfer money from ATMs. Jackpotting is a hacking scheme in which cybercriminals manipulate ATM machines into rapidly disbursing cash through the deployment of malware. This…
-
"Widespread API Use Heightens Cybersecurity Risks"According to a new survey conducted by Imperva, cybersecurity concerns surrounding the use of application programming interfaces (APIs) have significantly increased. Public-facing APIs raise security concerns as they provide a way in which hackers could…
-
"Microsoft Disables Spectre Mitigations Due to Instability"Microsoft released an update (KB4078130) over the weekend, designed to disable the mitigation sent out by Intel for the flaw causing Spectre Variant 2 (CVE-2017-5715). The update was sent out in response to Intel's announcement that the patches sent out…
-
"CT, MRI Machines Face the Greatest Risk of Cyberattack, Researchers Warn"A new report released by researchers from Ben-Gurion University highlights the increasing vulnerability of medical equipment to being targeted by cyberattackers. Researchers emphasize the importance of strengthening the security of Medical Imaging…
-
"Scientists Warn of Transduction Attacks on Sensors"Researchers from the University of Michigan and the Zhejiang University warn of the imminent dangers of transduction attacks in which external signals such as sound and electromagnetic waves are used to deliberately deceive sensors into reading incorrect…
-
CyberSTEM Camps at Maryland CyberSecurity Center (2018)MC2 facilitates a wide variety of educational opportunities on the UMD campus. MC2 also sponsors a number of educational/outreach events for lower-school, middle-school, and high-school students, especially targeting women and under-…
-
“Researchers Develop Way to Turn Commands into Voice-Activated AI Software”Researchers in the U.S. and China worked with IBM to conduct research on possible threats to the security of popular virtual assistants such as Siri, Alexa, and Google Assistant. A demonstration performed by researchers show how these virtual assistants…
-
“Hide 'N Seek IoT Botnet Caught Using Peer-To-Peer Communication”A new botnet called Hide N’ Seek (HNS) was recently discovered by Bitfender security researchers. According to researchers, the IoT botnet spreads to new victims and constructs its infrastructure through the use of custom-built Peer-to-Peer communication…
-
"Hackers Are Now Exploiting Youtube Ads to Hijack Your Computer and Secretly Mine Cryptocurrency"Security researchers at Trend Micro have discovered the exploitation of YouTube advertisements by hackers that allows a viewer's CPU power to be used to mine cryptocurrency. An analysis of YouTube advertisements revealed the use of Coinhive Javascript…
-
"Ransomware Actors Cut Loose on Health Care Organizations"Healthcare organizations are increasingly becoming the targets of ransomware attacks as indicated by recent attacks on Allscripts, Hancock Health, and Adams Health Network. Different variants of the infamous ransomware family called SamSam have been used…
-
Cyber Scene #17 - Accelerating Responsible Tech Driving into the FutureCyber Scene #17 Accelerating Responsible Tech Driving into the Future