News
-
"6 Steps for Sharing Threat Intelligence"Industry experts have emphasized six essential steps that organizations should take in order to improve upon the sharing of threat intelligence. Organizations must understand their event data before sharing, optimize the use of event data…
-
“Transparency of Machine-Learning Algorithms Is a Double-Edged Sword”Starting on May 25, 2018, the European Union's General Data Protection Regulation (GDPR) will be in full force. The set of rules to be enforced by the GDPR seek to protect the privacy of data, while giving EU residents a significant amount of control…
-
“Phishing Biggest Threat to Google Account Security”Phishing remains one of the most prominent and successful attacks, targeting users in a variety of ways designed to gain access to their online credentials such as login information, credit card data and more. Researchers at both University of California…
-
"New University Research Warning over Voice Recognition Biometric Security"A study conducted by researchers at the University of Eastern Finland reveals the inadequacy of voice recognition systems. According to researchers, voice recognition systems could be tricked by cyber criminals with the use of a number of different…
-
SoS Musings #8 - Need for Scientifically Backed SecuritySoS Musings #8 Need for Scientifically Backed Security
-
"Resilience to Phishing Attacks Is Failing to Improve"Phishing continues to be the most used tactic by attackers in launching targeted attacks, as it exploits the psychological weaknesses of humans. Studies show that an overwhelming majority of cyberattacks are initiated by the clicking of an email. This…
-
"Rise and Evolution of Ransomware Attacks"Ransomware has significantly grown in strength and frequency as shown by the recent widespread outbreaks of WannaCry and Petya attacks. In order for enterprises to become better prepared in the battle against ransomware, they must be aware of the…
-
"Homeland Security team remotely hacked a Boeing 757"Robert Hickey, an aviation program manager within the Cyber Security Division of the DHS S&T Directorate, has revealed a demonstration that was performed over a year ago in which a Boeing 757 was remotely hacked by him and his team of experts.…
-
“‘Eavesdropper’ Vulnerability Exposes Millions of Private Conversations”Security researchers have discovered a vulnerability, which can be exploited by attackers to gain access to millions of user conversations and SMS messages sent by applications that use the Twilio service. The "Eavesdropper" vulnerability…
-
“Can Biology Show Us How to Stop Hackers?”ASU Now interviewed Stephanie Forrest, who is the director of ASU Biodesign Institute Center for Biocomputing, Security and Society, as well as a professor in the School of Computing, Informatics and Decision Systems Engineering. Forrest discussed…
-
“Hackers Claim to Defeat iPhone X 'Face ID' Authentication”Security researchers at Bkav, an information security firm based in Vietnam, claim to have defeated the facial-recognition system used to authenticate users of Apple’s newest iPhone. Researchers have carefully crafted a mask with the use of 3D printing,…
-
"The Pentagon Opened Up to Hackers—And Fixed"The execution of the first ever federal bug bounty program by the name of “Hack The Pentagon” showed promising results as multiple vulnerabilities within certain public-facing DoD websites were able to be resolved. The discovery of these security…