News
  • “Satori Author Linked to New Mirai Variant Masuta”

    In a report released Tuesday by NewSky Security researchers have identified two more Mirai variants: Masuta and PureMasuta. The two variants use a Simple Object Access Protocol (SOAP) exploit, allowing the actor to bypass authentication and in return…

  • NSF Releases S&E Indicators 2018

    The National Science Foundation has released their report on Science and Engineering indicators in education; workforce; R&D; industry, technology, and the global marketplace; invention, knowledge transfer, and innovation; and public attitudes and…

  • Call for Proposals: Handbook of Military and Defense Operations Research

    James Howard and I are editing a new title from CRC Press, Handbook of Military and Defense Operations Research.  We are seeking case studies, essays, and positional papers to illustrate applications of operations research and analytics…

  • SoS Musings #10 - 2018 Internet Security and Regulations

    SoS Musings #10 2018 Internet Security and Regulations Around the new year articles predicting internet security start popping up. 2018 is not different.

  • "Study Finds Top Sites Can Be Impersonated Using Non-Latin Alphabet"

    A study conducted by Farsight Security reveals the use of Internationalized Domain Names (IDNs) to impersonate 125 top brand websites, including Apple, Amazon, Google, Microsoft, Facebook, and many more. IDN homograph attacks use non-Latin alphabets to…

  • "6 Ways Hackers Will Use Machine Learning to Launch Attacks"

    As artificial intelligence and machine learning are expected to significantly improve upon cybersecurity defenses, hackers are also expected to utilize such technologies in the launch of highly sophisticated cyberattacks. Adversarial machine learning is…

  • "Real-world Intercontinental Quantum Communications Enabled by the Micius Satellite"

    Intercontinental quantum key distribution (QKD) was successfully demonstrated through the use of a satellite by the name of Micius, which was developed by a team of scientists from the Chinese Academy of Sciences. An experiment conducted by scientists…

  • "How Threat Hunting Enhances Cybersecurity"

    As the frequency of cyberattacks continues to grow at a significant rate, organizations should take a proactive approach to protect their networks against such attacks. Threat hunting is a way in which organizations could proactively secure their…

  • "One-Quarter of Ethical Hackers Don't Bother Reporting Bugs Due to Lack of Disclosure Policies"

    HackerOne conducted a survey to which 1,698 members of the ethical hacking community responded. One-quarter of the ethical hackers that responded to the survey reveal that they do not report discovered vulnerabilities as affected companies lack…

  • “Meltdown-Spectre: Intel says newer chips also hit by unwanted reboots after patch”

    Intel released an update on the effects of its Meltdown-Spectre patches for newer CPUs on Wednesday, stating that some the patches cause the same unwanted and more frequent reboots as they do for the older CPUs. Following this, Intel has also…

  • “Pentagon Considers Nuclear Response to Retaliate for Large Cyber Attacks”

    The draft document of the Pentagon’s 2018 Nuclear Posture Review says that the U.S. would consider the use of nuclear weapons in defense against extreme non-nuclear strategic attacks. According to government officials, major cyberattacks against the U.S…

  • “New Cybersecurity Legislation to Penalize Companies for Data Breaches”

    A new cybersecurity legislation was recently proposed by two U.S. senators Elizabeth Warren (D-Mass.) and Mark Warner (D-Va.). The Data Breach Prevention and Compensation Act would empower the Federal Trade Commission (FTC) to inflict penalties on credit…